Dictionary · Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data
L2 — definitions grouped by regulatory framework.
All frameworksSecurity Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data
1 sense under Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data
Nouns
1 sense- Impersonation
A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data subject. Defeating impersonation is the primary objective of any authentication protocol. The result of this attack is a data breach (e.g. blaggers [sic] pretend to be someone they are not in order to wheedle out the information they are seeking obtaining information illegaly which they then sell for a specified price).