Difference between revisions of "Backdoor Access"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
(Created page with "{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" |- | '''1.''' Backdoors, along with C2 functio...")
 
 
(4 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' Backdoors, along with C2 functionalities, are one of the most common footholds into internal networks. Once threat actors have a foot in the backdoor, they begin their post-compromise activities. Through this access vector, threat actors can now drop additional malware to perform a myriad of tasks, including capturing keystrokes, that lead to compromised accounts, escalated privileges, and movement to other areas in the victim’s network, as well as establishing exfiltration points and methods for sensitive data.
+
| '''1.''' Backdoor access refers to [[Cyber_Criminal|cyber criminals]] utilising backdoor programs to secure remote access to computers or systems by bypassing normal authentication or encryption. Once backdoor access is granted, the compromise activities begin.  
''' Source: ''' (Verizon, 2016)
+
'''Related Term''': [[Configuration_Exploitation|Configuration Exploitation]]
 +
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/>
 +
{{Template:BLCoursesBanner}}
 +
{{Bcm Institute Source}}
  
 
|}
 
|}
 
+
&nbsp;
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
{{Template: BookMGBCMResponse}}
 
+
'''2.''' Backdoors, along with C2 functionalities, are one of the most common footholds into internal networks. Once threat actors have a foot in the backdoor, they begin their post-compromise activities. Through this access vector, threat actors can now drop additional malware to perform a myriad of tasks, including capturing keystrokes, that lead to compromised accounts, escalated privileges, and movement to other areas in the victim’s network, as well as establishing exfiltration points and methods for sensitive data.<br/> '''Source:''' (Verizon, 2016)<br/> &nbsp;
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
 
 
 
 
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 03:31, 3 November 2020

1. Backdoor access refers to cyber criminals utilising backdoor programs to secure remote access to computers or systems by bypassing normal authentication or encryption. Once backdoor access is granted, the compromise activities begin.

Related Term: Configuration Exploitation







(Source: Business Continuity Management Institute - BCM Institute)

 

2. Backdoors, along with C2 functionalities, are one of the most common footholds into internal networks. Once threat actors have a foot in the backdoor, they begin their post-compromise activities. Through this access vector, threat actors can now drop additional malware to perform a myriad of tasks, including capturing keystrokes, that lead to compromised accounts, escalated privileges, and movement to other areas in the victim’s network, as well as establishing exfiltration points and methods for sensitive data.
Source: (Verizon, 2016)