Show Summary Details

Quick Reference

The process of listening in to an interactive session on a network, cancelling the log out issued by the user and continuing the session masquerading as the user. It is also known as a piggy back attack. It is usually carried out for criminal reasons.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.