Piggybacking: The practice of gaining unauthorized access to a restricted area by following someone who has legitimate access. It is often used by individuals who do not have the proper credentials to enter a building or facility but can gain access by following someone who does. It is used in the field of information security to identify and prevent potential security breaches by unauthorized individuals. 3 examples of piggybacking are an individual following an employee into a secure office building, a visitor following a resident into a gated community, and a customer following an employee into a restricted area of a store.
Categories: CC D4: Network Security | CCSP D4: Cloud Application Security | CISM D4: Incident Management | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D1: Security Concepts and Practices
« Back to Glossary Index