Main Description
A planned and methodical attempt to break or otherwise circumvent the normal operation of a running computer
software program. Often malicious in nature, the concept of attacking computer software originated in the
software hacker (A.K.A cracker) community whose members use various techniques to attack software systems,
typically to circumvent security software and gain illegal entry to a host system. Examples of recognized
attack techniques include buffer overflow, denial of service, resource constraint and Trojan horse. This term
has subsequently been adopted by computer software testing professionals in discussing the methods by which
they might expose potential bugs in a software system. |
© Copyright IBM Corp. 1987, 2006. All Rights Reserved.
|
| |
|