Piggyback attack
{{Short description|Form of wiretapping}}
{{Orphan|date=August 2016}}
A Piggyback attack is an active form of wiretapping where the attacker gains access to a system via intervals of inactivity in another user's legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".{{cite book|author1=David Kim|author2=Michael G. Solomon|title=Fundamentals of Information Systems Security|date=2010|publisher=Jones & Bartlett Publishers|isbn=978-1449671648}}
In security, piggybacking refers to when someone tags along with another person who is authorized to gain entry into a restricted area. The term is applied to computer networks in this context.IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949.