Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Back Door

Modern Theories and Practices for Cyber Ethics and Security Compliance
A feature in a program that allows access that bypasses security.
Published in Chapter:
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Winfred Yaokumah (University of Ghana, Ghana), Ferdinard Katsriku (University of Ghana, Ghana), Jamal-Deen Abdulai (University of Ghana, Ghana), and Kwame Okwabi Asante-Offei (Ghana Institute of Management and Public Administration, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch002
Abstract
Application security measures are the controls within software systems that protect information assets from security attacks. Cyber attacks are largely carried out through software systems running on computing systems in cyberspace. To mitigate the risks of cyber attacks on software systems, identification of entities operating within cyberspace, threats to application security and vulnerabilities, and defense mechanisms are crucial. This chapter offers a taxonomy that identifies assets in cyberspace, classifies cyber threats into eight categories (buffer overflow, malicious software, input attacks, object reuse, mobile code, social engineering, back door, and logic bomb), provides security defenses, and maps security measures to control types and functionalities. Understanding application security threats and defenses will help IT security professionals in the choice of appropriate security countermeasures for setting up strong defense-in-depth mechanisms. Individuals can also apply these safeguards to protect themselves from cyber-attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Issues to Consider when Choosing Open Source Content Management Systems (CMSs)
A code that can be attached to an application or software to enable the bypass of security mechanisms.
Full Text Chapter Download: US $37.50 Add to Cart
Hackers, Hacking, and Eavesdropping
In the security of a system, this is a hole deliberately left in place by designers or maintainers. May be intended for use by service technicians. However, it is more commonly used now a days to refer to software, which has been maliciously loaded by persons remotely in order to allow them to enter the system through a ‘back door’ at an opportune time.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR