💡 Learn from AI

Introduction to Social Engineering

Tailgating and Piggybacking

Tailgating and Piggybacking

Tailgating and Piggybacking are two common social engineering tactics that involve physically following someone into a secure location.

Tailgating

Tailgating occurs when an attacker follows closely behind an authorized person who is entering a restricted area, without being detected. For example, an attacker might wait near an entrance and hold the door open for someone, then follow them inside before the door closes. Once inside, the attacker is free to move about and access sensitive information or assets.

Piggybacking

Piggybacking is similar to tailgating, but involves the attacker asking an authorized person to hold the door open for them, using a pretext such as being in a hurry or not having their keycard. The attacker then follows the authorized person inside, again without being detected.

Tailgating and Piggybacking attacks can be difficult to detect, as they rely on the attacker blending in with legitimate employees or visitors. They can also be difficult to prevent, as they often rely on the kindness or helpfulness of the authorized person. However, there are some steps that can be taken to minimize the risk of these types of attacks. For example, employees can be trained to be aware of who is around them and to challenge anyone who is not authorized to be in the area. Access controls can also be put in place to prevent unauthorized individuals from entering secure areas.

Take quiz (4 questions)

Previous unit

Pretexting and Baiting

Next unit

Quid Pro Quo and Reverse Social Engineering

All courses were automatically generated using OpenAI's GPT-3. Your feedback helps us improve as we cannot manually review every course. Thank you!