B

Back door – programmers and administrators deliberately leave ways into software systems that can be used later to allow access to the system while bypassing the authorised user file. Sometimes, developers forget to take out something that was put there simply to ease development work or to assist with the debugging routine. Sometimes they are deliberately left in to help field engineers maintain the system. However they get there, they can provide any unauthorised user with access to the system.

Back orifice – is a remote administration tool that has great potential for malicious use. It is very easy to use, so that script kiddies have no problem using it. It is also ‘extensible’, which means that it develops and improves with age. Most anti-malware ...

Get ISO27000 and Information Security: A Combined Glossary now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.