Statements (55)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Computer_security_term
|
| gptkbp:canBe |
Data exfiltration
Remote access Maintaining persistence Privilege escalation |
| gptkbp:canBeDeployedOn |
gptkb:Trojans
gptkb:malware Attackers |
| gptkbp:canBeHiddenIn |
gptkb:personal_computer
gptkb:software gptkb:Firmware Operating systems Applications Network devices |
| gptkbp:canBeIntentional |
Yes
|
| gptkbp:canBePlantedBy |
gptkb:Insiders
Vendors Developers External attackers |
| gptkbp:canBeUnintentional |
Yes
|
| gptkbp:category |
gptkb:malware
Cybersecurity Computer security |
| gptkbp:defines |
A method of bypassing normal authentication or security controls in a computer system, product, or embedded device
|
| gptkbp:detects |
Security audits
Code review Antivirus software Intrusion detection systems |
| gptkbp:introducedIn |
1970s
|
| gptkbp:mitigatedBy |
Monitoring
Access control Network segmentation Patching Security best practices |
| gptkbp:notableExample |
gptkb:Juniper_ScreenOS_backdoor
gptkb:NSA_Dual_EC_DRBG_backdoor gptkb:Shadow_Brokers_leaks gptkb:Sony_BMG_rootkit_scandal gptkb:Stuxnet |
| gptkbp:relatedTo |
gptkb:Trojan
gptkb:Trapdoor gptkb:malware Spyware Exploit Logic bomb Remote administration tool Rootkit Zero-day vulnerability |
| gptkbp:usedBy |
gptkb:Hackers
Malware authors System administrators (for legitimate purposes) |
| gptkbp:usedFor |
Gaining unauthorized access to a computer system
|
| gptkbp:bfsParent |
gptkb:Lil_Durk
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Backdoor
|