[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200508101857.14441.ekamerling@snaplen.com>
Date: Wed Aug 10 23:57:24 2005
From: ekamerling at snaplen.com (Erik Kamerling)
Subject: Re: Help put a stop to incompetent computer
forensics
Trojan Horse
A computer program that appears to have a useful function, but also has a
hidden and potentially malicious function that evades security mechanisms,
sometimes by exploiting legitimate authorizations of a system entity that
invokes the program.
Copied from the SANS Glossary of Terms Used in Security and Intrusion
Detection.
http://www.sans.org/resources/glossary.php
Best
Erik Kamerling
On Wednesday 10 August 2005 18:43, Jason Coombs wrote:
> I'll do some more work on this and see where it leads. The proposal of
> "backdoor" as the better term just doesn't work, since a backdoor is a
> hidden mechanism for gaining entry or control of a system that is built
> into the system by its creator or some other involved party. An intruder
> may open up a backdoor in a system by altering its programming rather
> than by planting a Trojan, so there needs to be a distinction between
> the two.
Powered by blists - more mailing lists