connection hijacking

Quick Reference

The process whereby an intruder intercepts a connection between a user and a computer and takes over the role of one of the parties in the dialogue that takes place. For example, an intruder may mimic the user and carry out a number of financial transactions in the user's name which favours the intruder. Another example is where the intruder mimics the computer and gathers useful information such as the password employed by the user.

Subjects: Computing.

Reference entries