IT Baseline Protection Manual T 5.24 Replay of messages
T 5.24 Replay of messages
For such an attack, perpetrators record a message and replay it unchanged at a later time.
Examples:
- Recording of user ID and password in order to get access to a system by faking a wrong identity (cf. also T 5.21 - Trojan horses).
- Repeated placing of an order so as to cause financial loss
.
© Copyright
by Bundesamt für Sicherheit in der Informationstechnik |
|
|