Skip navigation

A hidden or disguised access point that bypasses an information system’s security measures, allowing hackers or other unauthorized users to enter.