The IT Law Wiki
Advertisement

Definition[]

A root compromise

is similar to an account compromise, except that the account that has been compromised has special privileges on the system.[1]

Overview[]

The term root is derived from an account on UNIX systems that typically has unlimited, or "superuser", privileges. Intruders who succeed in a root compromise can do just about anything on the victim'ssystem, including run their own programs, change how the system works, and hide traces of their intrusion."[2]

References[]

  1. US-CERT, Security of the Internet (full-text).
  2. Id.
Advertisement