Impersonation
nounid
4927·updated May 13, 2026candidate
No definition recorded.
Classifications
Entity Type
Threat92%llm-generatedllm:claude-haiku-4-5
Sensitivity
Regulated85%llm-generatedllm:claude-haiku-4-5
Information Class
unclassified
Variants
- plural
- Impersonations
- possessive
- Impersonation's
- pluralpossessive
- Impersonations'
Framework definitions
Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data1 senseview framework →
- §1
- A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data subject. Defeating impersonation is the primary objective of any authentication protocol. The result of this attack is a data breach (e.g. blaggers [sic] pretend to be someone they are not in order to wheedle out the information they are seeking obtaining information illegaly which they then sell for a specified price).
Outgoing relationships
No outgoing triples
This term is not the subject of any RDF-style relationship yet.
Incoming relationships
No incoming triples
No other term currently asserts a relationship to this one.