Backdoor

A backdoor is a method, often secret, ofbypassing normal authentication in a product, cryptosystem or algorithm etc.Backdoors are often used for securing unauthorized remote access to a computer,or obtaining access to plaintext in cryptographic systems.

A backdoor may take the form of a hiddenpart of a program, a separate program, or may be a hardware feature. Althoughnormally surreptitiously installed, in some cases backdoors are deliberate andwidely known. These kinds of backdoors might have “legitimate” uses such asproviding the manufacturer with a way to restore user passwords.

Default passwords can function as backdoorsif they are not changed by the user.  Somedebugging features can also act as backdoors if they are not removed in therelease version.


'Computer Science > Terminology' 카테고리의 다른 글

Proxy server  (0) 2018.03.30
Internet  (0) 2018.03.30
Computer worm  (0) 2018.03.30
Payload  (0) 2018.03.30
Trivial File Transfer Protocol (TFTP)  (0) 2018.03.30

Computerworm

A computerworm is a standalone malware computer program that replicates itself inorder to spread to other computers. Often, it uses a computer network to spreaditself, relying on security failures on the target computer to access it.Unlike a computer virus, it does not need to attach itself to an existingprogram. Worms almost always cause at least some harm to the network, even ifonly by consuming bandwidth, whereas viruses almost always corrupt or codifyfiles on a targeted computer.

Many worms that have been created aredesigned only to spread, and do not attempt to change the systems they passthrough. However, as the Morris worm and Mydoom showed, even these “payloadfree” worms can cause major disruption by increasing network traffic and other unintendedeffects. A “payload” is code in the worm designed to do more than spread theworm – it might delete files on a host system (e.g., the ExploreZip worm), encryptfiles in a ransomware attack, or send documents via email. A very commonpayload for worms is to install a backdoor in the infected computer to allowthe creation of a “zombie” computer under control of the worm author. Networksof such machines are often referred to as botnets and are very commonly used byspam senders for sending junk email or to cloak their website’s address.Spammers are therefore thought to be a source of funding for the creation ofsuch worms, and the worm writhers have been caught selling lists of IPaddresses of infected machines. Others try to backmail companies or schoolswith threatening DoS attacks.

Users can minimize the threat posed byworms by keeping their computers’ operating system and other software up to date,avoiding opening unrecognized or unexpected email and running firewall andantivirus software.

Backdoors can be exploited by other malware, including worms. Examplesinclude Doomjuice, which can spread using the backdoor opened by Mydoom, and atleast one instance of malware taking advantage of the rootkit and backdoorinstalled by the Sony/BMG DRM software utilized by millions of music CDs priorto late 2005.


'Computer Science > Terminology' 카테고리의 다른 글

Internet  (0) 2018.03.30
Backdoor  (0) 2018.03.30
Payload  (0) 2018.03.30
Trivial File Transfer Protocol (TFTP)  (0) 2018.03.30
Local Area Network (LAN)  (0) 2018.03.30

+ Recent posts