Exploiting a (usually false) association to gain advantage.
Examples include walking into a secure facility with a group of other people
as one of the crowd, acting like an ex-policeman to gain intelligence about
ongoing police activities, and adding a floppy disk to a series of floppy
disks delivered as part of a normal update process.
Complexity: No
published measures of complexity for piggybacking attacks have been made to
date, however, certain types of these attacks appear to be trivially carried
out.
fc@red.a.net