Defined term

Verifier Impersonation Attack

Verifier Impersonation Attack: A scenario where the Attacker impersonates the Verifier in an authentication protocol, usually to capture information that can…

📋 Single Source
Cybersecurity

Definition

A scenario where the Attacker impersonates the Verifier in an authentication protocol, usually to capture information that can be used to masquerade as a Claimant to the real Verifier. (SP 800-63) (NISTIR)

Sources

1
The Cyber Glossary
View Source

Continue Research

Browse the full glossary for adjacent terms, or subscribe for updates when definitions and sources are expanded.