Account Takeover
Table of Contents | ||||||
---|---|---|---|---|---|---|
|
...
- Correct the conceptual diagram to expressly mention that it is without authorization
Alternative Forms
Account Hijacking
ATO
Acronym
Identity Hijacking
Identity Takeover
Identity Usurpation
...
Conceptual Diagram
...
Examples
Eve found that Alice’s dog was named Bob. To takeover her social network account, Eve tried to login as Alice using “BOB” as a password. But because Alice was using MFA, Eve’s nefarious plan failed miserably, even though “BOB” was the right password.
Related Terms
Account
Credential Theft
Identity Theft
SIM Jacking
True Name Identity Theft
...