Overview

connection hijacking


Related Overviews

 

'connection hijacking' can also refer to...

 

More Like This

Show all results sharing this subject:

  • Computing

GO

Show Summary Details

Quick Reference

The process whereby an intruder intercepts a connection between a user and a computer and takes over the role of one of the parties in the dialogue that takes place. For example, an intruder may mimic the user and carry out a number of financial transactions in the user's name which favours the intruder. Another example is where the intruder mimics the computer and gathers useful information such as the password employed by the user.

Subjects: Computing.


Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.