#WeekendWisdom 075 Backdoors

come to #WeekendWisdom number 75. This week we’re going to talk about Backdoors.

Where does this term Backdoors come from?

A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the back. This door cannot seen from the front of the building.

In cyber security terminology?

In cyber security terms a backdoor is a way in that is unseen, into an appliance or device or to a network.

Back in #WeekendWisdom number 61, I talked about a backdoor to a set of firewalls. This was where the manufacturer had put in place a hardcoded password. This password enabled them to be able to sign into those firewalls through the backdoor.

What way can hackers use Backdoors?

But hackers tend to use a bit more sophisticated methods to establish their backdoors. If they break into your network they usually want to try and keep their access on there. So they will usually install some program, some piece of software on one of the devices on the network to establish what we call a persistent connection, where they can just keep coming back.

That’s just a piece of software that opens up a backdoor. Sets up a communication with the outside world that the hacker controls and that they can use to come back in and continue doing whatever they want to do on your network.

So that’s what a backdoor is in cyber security terms.

So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.

How can L2 Cyber Security help you?

We offer a full range of training programmes, which can be delivered online or in-person*.

L2 Cyber Security are also a partner of CyberRiskAware for online self-directed Cyber Security Awareness training and Phishing testing.

Contact us for more information at info@L2CyberSecurity.com.

*With appropriate social distancing and other health and safety measures adhered to.

Follow us on Social media:

Liam is available on TwitterLinkedIn and Instagram.

Follow L2 Cyber on TwitterLinkedInInstagram and Facebook.

© L2 Cyber Security Solutions