O'Reilly logo

ISO27000 and Information Security: A Combined Glossary by Steve G. Watkins, Alan Calder

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

B

Back door – programmers and administrators deliberately leave ways into software systems that can be used later to allow access to the system while bypassing the authorised user file. Sometimes, developers forget to take out something that was put there simply to ease development work or to assist with the debugging routine. Sometimes they are deliberately left in to help field engineers maintain the system. However they get there, they can provide any unauthorised user with access to the system.

Back orifice – is a remote administration tool that has great potential for malicious use. It is very easy to use, so that script kiddies have no problem using it. It is also ‘extensible’, which means that it develops and improves with age. Most anti-malware ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required