Computer containing hidden software that enables the machine to be controlled remotely, usually to perform an attack on another computer.

NOTE Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious activities under remote direction.

Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards

Comments are closed.