home/glossary/Impersonation

Impersonation

nounid 4927·updated May 13, 2026
candidate

No definition recorded.

Classifications

Entity Type

Threat92%llm-generatedllm:claude-haiku-4-5

Sensitivity

Regulated85%llm-generatedllm:claude-haiku-4-5

Information Class

unclassified

Variants

plural
Impersonations
possessive
Impersonation's
pluralpossessive
Impersonations'

Framework definitions

Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data1 senseview framework →
§1
A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data subject. Defeating impersonation is the primary objective of any authentication protocol. The result of this attack is a data breach (e.g. blaggers [sic] pretend to be someone they are not in order to wheedle out the information they are seeking obtaining information illegaly which they then sell for a specified price).

Outgoing relationships

No outgoing triples
This term is not the subject of any RDF-style relationship yet.

Incoming relationships

No incoming triples
No other term currently asserts a relationship to this one.