Matches in DBpedia 2015-10 for { <http://dbpedia.org/resource/Piggyback_attack> ?p ?o }
Showing triples 1 to 19 of
19
with 100 triples per page.
- Piggyback_attack abstract "Piggyback attack is an active form of wiretapping. In fact the attacker gains access to a system via intervals of inactivity in another user’s legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".In security, piggybacking is actually when someone tags along with another person who is authorized to gain entry into a restricted area, or pass something. Here we apply that concept to computer networks or workstations.".
- Piggyback_attack wikiPageID "44361734".
- Piggyback_attack wikiPageLength "961".
- Piggyback_attack wikiPageOutDegree "3".
- Piggyback_attack wikiPageRevisionID "633813971".
- Piggyback_attack wikiPageWikiLink Category:Internet_security.
- Piggyback_attack wikiPageWikiLink Category:Surveillance.
- Piggyback_attack wikiPageWikiLink Telephone_tapping.
- Piggyback_attack wikiPageWikiLink Wiretapping.
- Piggyback_attack hasPhotoCollection Piggyback_attack.
- Piggyback_attack wikiPageUsesTemplate Template:Reflist.
- Piggyback_attack subject Category:Internet_security.
- Piggyback_attack subject Category:Surveillance.
- Piggyback_attack hypernym Form.
- Piggyback_attack comment "Piggyback attack is an active form of wiretapping. In fact the attacker gains access to a system via intervals of inactivity in another user’s legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".In security, piggybacking is actually when someone tags along with another person who is authorized to gain entry into a restricted area, or pass something. Here we apply that concept to computer networks or workstations.".
- Piggyback_attack label "Piggyback attack".
- Piggyback_attack sameAs m.01296l9h.
- Piggyback_attack wasDerivedFrom Piggyback_attack?oldid=633813971.
- Piggyback_attack isPrimaryTopicOf Piggyback_attack.