The IT Law Wiki

Root compromise

32,081pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

A root compromise

is similar to an account compromise, except that the account that has been compromised has special privileges on the system.[1]

Overview Edit

The term root is derived from an account on UNIX systems that typically has unlimited, or "superuser", privileges. Intruders who succeed in a root compromise can do just about anything on the victim's system, including run their own programs, change how the system works, and hide traces of their intrusion."[2]

References Edit

  1. US-CERT, Security of the Internet (full-text).
  2. Id.

Also on Fandom

Random Wiki