Piggybacking (security)
   HOME

TheInfoList



OR:

In
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint. It can be either electronic or physical. The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act. To describe the act of an unauthorized person who follows someone to a restricted area ''without'' the consent of the authorized person, the term tailgating is also used. "Tailgating" implies no consent (similar to a car
tailgating Tailgating is the action of a driver driving behind another vehicle while not leaving sufficient distance to stop without causing a collision if the vehicle in front stops suddenly. The safe distance for following another vehicle varies depend ...
another vehicle on a road), while "piggybacking" usually implies consent of the authorized person. Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in
airport security Airport security includes the techniques and methods used in an attempt to protect passengers, staff, aircraft, and airport property from malicious harm, crime, terrorism, and other threats. Aviation security is a combination of measures and hum ...
. A study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets, were successful. Piggybacking was revealed as one of the methods that was used in order to enter off-limits areas.


Methods


Electronic

* A user fails to properly log off their computer, allowing an unauthorized user to "piggyback" on the authorized user's session.


Physical

Piggybackers have various methods of breaching security. These may include: *Surreptitiously following an individual authorized to enter a location, giving the appearance of being legitimately escorted *Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely unchecked *Finding an authorized person who either disregards the
law Law is a set of rules that are created and are enforceable by social or governmental institutions to regulate behavior,Robertson, ''Crimes against humanity'', 90. with its precise definition a matter of longstanding debate. It has been vario ...
or the rules of the facility, or is tricked into believing the piggybacker is authorized, and agreeably allows the piggybacker to tag along Piggybacking can be regarded as one of the simpler forms of social engineering.


See also

* Gate crashing


References

{{reflist Security breaches Access control