Hijacking attacks: A type of cyberattack in which an attacker takes control of a legitimate user’s session or network connection without the user’s knowledge or consent. This concept is used in the context of computer security to describe attacks that aim to steal sensitive information or gain unauthorized access to a system. Examples of hijacking attacks include session hijacking, where an attacker takes control of a user’s session, and man-in-the-middle attacks, where an attacker intercepts and modifies communications between two parties.
Categories: CC D5: Security Operations | CCSP D4: Cloud Application Security | CISM D3: Information Security Program | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D7: Systems and Application Security
« Back to Glossary Index