Backdoor

GPTKB entity

Statements (55)
Predicate Object
gptkbp:instanceOf Computer security term
gptkbp:canBe Data exfiltration
Remote access
Maintaining persistence
Privilege escalation
gptkbp:canBeDeployedOn gptkb:Trojans
malware
Attackers
gptkbp:canBeHiddenIn gptkb:personal_computer
gptkb:software
Operating systems
Firmware
Applications
Network devices
gptkbp:canBeIntentional Yes
gptkbp:canBePlantedBy gptkb:Insiders
Vendors
Developers
External attackers
gptkbp:canBeUnintentional Yes
gptkbp:category malware
Cybersecurity
Computer security
gptkbp:defines A method of bypassing normal authentication or security controls in a computer system, product, or embedded device
gptkbp:detects Security audits
Code review
Antivirus software
Intrusion detection systems
https://www.w3.org/2000/01/rdf-schema#label Backdoor
gptkbp:introducedIn 1970s
gptkbp:mitigatedBy Monitoring
Access control
Network segmentation
Patching
Security best practices
gptkbp:notableExample gptkb:Juniper_ScreenOS_backdoor
gptkb:NSA_Dual_EC_DRBG_backdoor
gptkb:Shadow_Brokers_leaks
gptkb:Sony_BMG_rootkit_scandal
gptkb:Stuxnet
gptkbp:relatedTo gptkb:Trapdoor
malware
Trojan
Spyware
Exploit
Logic bomb
Remote administration tool
Rootkit
Zero-day vulnerability
gptkbp:usedBy gptkb:Hackers
Malware authors
System administrators (for legitimate purposes)
gptkbp:usedFor Gaining unauthorized access to a computer system
gptkbp:bfsParent gptkb:Lil_Durk
gptkbp:bfsLayer 4