Skip navigation

A hidden or disguised access point that bypasses an information system’s security measures, allowing hackers or other unauthorized users to enter.


Want More Content Like This?

Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.