expand for answer

Trap Door

A hidden software or hardware mechanism that permits system protection mechanisms to be circumvented. It is activated in some nonapparent manner; for example, a special “random” key sequence at a terminal. Synonymous with back door. Undocumented command sequence that allows software developers to bypass normal access restrictions.


Similar items:
Undocumented command sequences that allow individuals with knowledge of the backdoor to bypass normal access restrictions. Backdoors may be placed and left by the manufacturer or planted by hackers using exploits.
[view]
Hidden software or hardware mechanism used to circumvent security controls. Synonymous with trap door.
[view]
APIs allow application developers to bypass traditional web pages and interact directly with the underlying service through function calls. While offering and using APIs creates tremendous opportunities for service providers, it also poses some security risks. Developers must be aware of these challenges and address them when they create and use APIs.
[view]
The combination of hardware, software, and controls that form a trusted base that enforces your security policy. The totality of protection mechanisms within a computer system, including hardware, software, and communications equipment, the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (such as a user’s clearance) related to the security policy. Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.
[view]
Procedure for identifying and authenticating a remote information system terminal, whereby the host system disconnects the terminal and reestablishes contact. Synonymous with dial back.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in