Describe the process of piggybacking Is this common attack t
Describe the process of piggybacking. Is this common attack technique possible in your work or school environment?
Solution
Piggybacking is an illegal access to controlled or private communication for which client has no access by using session which one more user is associated.
For example, access to access card or physical access to facility for which user has no authority or permission.
Yes, it is usually use as it is one of the social engineering techniques which can be use in work or school.
