Piggybacking (security)

Piggybacking (security)

In security, piggybacking refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint [ [http://www.newtonsecurityinc.com/HWpr.htm Honeywell Press release ] ] . The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act.

Depending on the type of location, levels of security vary. Some checkpoints have very high levels in which all individuals are checked, regardless, and therefore are capable of preventing nearly all piggybacking. These may include those with intense human surveillance or interaction, such as those at airports, apartments with doormen, or turnstiles.

Others, with weaker controls, are more likely to allow such a breach. These may include unmanned entries with the use of a card or entry code or locations where an attendant can be easily distracted by other duties such as checking others.

Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in airport security. While a study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets were successful, piggybacking was revealed as one of the methods that was used in order to enter off-limits areas [ [http://www.guardian.co.uk/egyptair/article/0,,196578,00.html Inspectors walk through US airport security | World news | The Guardian ] ] .

Methods

Piggybackers have various methods of breeching security. These may include:
*Surreptitiously following an individual authorized to enter a location, giving the appearance of being legitimately escorted
*Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely unchecked
*Finding an authorized person who either carelessly disregards the law or the rules of the facility, or is tricked into believing the piggybacker is authorized, and agreeably allows the piggybacker to tag along

Reasons

As piggybacking can be used to cause harm, such as avoidance in paying a required fee or gaining access to an area completely off limits to the piggybacker, one might assume that all piggybacking is done with the intention of causing harm. However, some piggybacking occurs when a person can obtain legal access, but does not want to go through the hassle of signing in, presenting identification, or being involved in an interaction with the staff.

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Piggybacking — may refer to: Piggy back (transportation), something that is riding on the back of something else Piggybacking (security), when an authorized person allows (intentionally or unintentionally) others to pass through a secure door Splash cymbal… …   Wikipedia

  • Piggybacking (internet access) — Piggybacking is a term used to refer to access of a wireless internet connection by bringing one s own computer within the range of another s wireless connection, and using that service without the subscriber s explicit permission or knowledge.… …   Wikipedia

  • Legality of piggybacking — Laws regarding unauthorized access of a computer network exist in many locales, including the U.S. federal government, all 50 U.S. states, and other countries, though the wording and meaning differ from one to the next. However, the… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Wireless LAN security — One issue with corporate wireless networks in general, and WLANs in particular, involves the need for security. Many early access points could not discern whether or not a particular user had authorization to access the network. Although this… …   Wikipedia

  • Wi-Fi — For the radio station, see WIFI (AM). Wi Fi logo Wi Fi (  / …   Wikipedia

  • Unicité de passage — Le contrôle de l’unicité de passage (encore appelé contrôle de l’unicité de présence, ou encore sas unipersonnel) est un concept permettant de s assurer de la présence d une seule personne dans une zone spécifique, et ainsi s’assurer que seule la …   Wikipédia en Français

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Hotspot (Wi-Fi) — A diagram showing a Wi Fi network A hotspot is a site that offers Internet access over a wireless local area network through the use of a router connected to a link to an Internet service provider. Hotspots typically use Wi Fi technology.… …   Wikipedia

  • Wardriving — is the act of searching for Wi Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA.Software for wardriving is freely available on the Internet, notably NetStumbler for Windows, Kismet or SWScanner for Linux,… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”