Which social engineering technique involves an attacker gaining access to a controlled area by using someone else's credentials with that person's permission?
Piggybacking is similar to tailgating but the difference is that the individual whose credentials is being used is consenting to the use of their credentials and the unauthorized person following them into a restricted area.
Learn More
AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between piggybacking and tailgating?
What are some common scenarios where piggybacking might occur?
What are some security measures to prevent piggybacking?