Statements (55)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Computer security term
|
gptkbp:canBe |
Data exfiltration
Remote access Maintaining persistence Privilege escalation |
gptkbp:canBeDeployedOn |
gptkb:Trojans
malware Attackers |
gptkbp:canBeHiddenIn |
gptkb:personal_computer
gptkb:software Operating systems Firmware Applications Network devices |
gptkbp:canBeIntentional |
Yes
|
gptkbp:canBePlantedBy |
gptkb:Insiders
Vendors Developers External attackers |
gptkbp:canBeUnintentional |
Yes
|
gptkbp:category |
malware
Cybersecurity Computer security |
gptkbp:defines |
A method of bypassing normal authentication or security controls in a computer system, product, or embedded device
|
gptkbp:detects |
Security audits
Code review Antivirus software Intrusion detection systems |
https://www.w3.org/2000/01/rdf-schema#label |
Backdoor
|
gptkbp:introducedIn |
1970s
|
gptkbp:mitigatedBy |
Monitoring
Access control Network segmentation Patching Security best practices |
gptkbp:notableExample |
gptkb:Juniper_ScreenOS_backdoor
gptkb:NSA_Dual_EC_DRBG_backdoor gptkb:Shadow_Brokers_leaks gptkb:Sony_BMG_rootkit_scandal gptkb:Stuxnet |
gptkbp:relatedTo |
gptkb:Trapdoor
malware Trojan Spyware Exploit Logic bomb Remote administration tool Rootkit Zero-day vulnerability |
gptkbp:usedBy |
gptkb:Hackers
Malware authors System administrators (for legitimate purposes) |
gptkbp:usedFor |
Gaining unauthorized access to a computer system
|
gptkbp:bfsParent |
gptkb:Lil_Durk
|
gptkbp:bfsLayer |
4
|