The event of an entity that switches identity to appear to the system or organizational process with the identity of another entity. Impersonation may be authorized (e.g. authorized security context switching) or unauthorized (e.g. impersonation attack). Depending on context, impersonation may designate the act of impersonating, the event of impersonation or the ability to impersonate. |