Get premium membership and access questions with answers, video lessons as well as revision papers.

Define Masquerading.

      

Define Masquerading.

  

Answers


Kavungya
Masquerading occurs when one person uses the identity of another to gain access to a computer. This may be done in person or remotely. There are both physical and electronic forms of masquerading. In person, a criminal may use an authorized user's identity or access card to get into restricted areas where he will have access to computers and data. This may be as simple as signing someone else's name to a sign-in sheet at the door of a building. It may be as complex as playing back a voice recording of someone else to gain entry via a voice recognition system.
A related attack, sometimes called piggybacking, involves following an authorized person into a restricted area--a building or a computer room.
People are very likely to pick passwords that can be easily guessed by intruders or can be cracked by password cracking or dictionary programs. They pick the names of their spouses, children, or pets, their birthdates or license plates or astrological signs, or the names of sports teams or fictional characters.
Kavungya answered the question on May 17, 2019 at 09:36


Next: Define software piracy.
Previous: The standard electrode potentials for some half cells are given below.

View More Introduction to ICT Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions