Piggybacking

(redirected from Replay attack)
Also found in: Dictionary, Thesaurus, Medical, Legal, Encyclopedia, Wikipedia.

Piggybacking

A broker who trading stocks, bonds or commodities in a personal account following a trade just made for a customer. The broker assumes that the customer is making the trade on valuable inside information.

Piggybacking

The practice in which a broker conducts a transaction on his/her own account after filling a similar order on behalf of a client. For example, if a client sells 10,000 shares and the broker owns some shares in the same company, he may piggyback by selling his own shares. A broker piggybacks when he/she believes that the client has insider information, or at least a better understanding than the broker on the market's future movements. Piggybacking should not be confused with piggy back registration, which is a different concept altogether.
References in periodicals archive ?
Anecdotal accounts suggest payment associations are moving to improve the on-chip cryptographic features of these cards, including challenge-response protocols, to further frustrate replay attacks.
16] proposed a secure authentication scheme for DTV broadcasting and claimed that their scheme allows users to freely choose the password, provides security against replay attack, impersonation attack, offers mutual authentication and session key generation.
11i authentication and another that spots dangerous Address Resolution Protocol (ARP) replay attacks which allow hackers to capture data and network traffic mid-air.
TI's secure contactless chip incorporates a number of security features to provide data privacy in sensitive applications and to protect against cloning and replay attacks.
LON 100, the new driver software provides outstanding security including RC4 encryption, MD5 authentication, and protection from replay attacks, as well as transparent, fault tolerant session recovery when the IP connection or power is interrupted.
The software offers increased security by using the Digest Access Authentication Scheme to ensure message integrity, avert replay attacks and prevent passwords from being sent without protection.
Another important function that the Control Center provides is tracking the fate of every email, so that a complete accounting of delivered and opened is possible -- preventing certain attacks known as "message replay attacks.
Security functions within the card's operating system and the SSC check integrity and validity of each message and provide the highest possible level of application security, preventing fraud attempts, falsification and replay attacks," states Dr.
SignOut method and provides more information about how to ease cookie replay attacks when a forms authentication cookie may have been obtained by a malicious user.
The management station will then be able to enter into a low-level interaction with the agent to establish a secure network management environment, first using authentication to establish communication, then synchronizing the station and agent clocks to prevent replay attacks and attaching cryptographic checksums using the Keyed-MD5 algorithm.
The new service adds a device-oriented factor to the authentication process, helping enterprises guard against deceptive practices that can compromise a corporate network such as password theft, identity spoofing and replay attacks.