December 4, 2024 by Alex« Back to Glossary IndexA method by which an authorized user can bypass normal authentication procedures to access a computer system or network remotely without being detected.Related« Back to Glossary Index