Backdoors can also be installed by software or hardware makers as a deliberate means of gaining access to their technology after the fact. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices.īut backdoors aren't just for bad guys. In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. In fact, there's no reason you couldn't rob this house through the same backdoor again, assuming you don't ransack the place.Ĭomputer backdoors work in much the same way.
To the casual observer, there are no external signs of a burglary. You see there's a backdoor, cross your fingers, and try the knob-it's unlocked. Being the crafty cat burglar that you are, you hop the fence leading to the back of the house. You see a 'Protected by…' security sign staked in the front lawn and Ring doorbell camera.
Imagine you're a burglar casing a house for a potential robbery.