User:Alicevoe/sandbox/draft

Backdoors are a form of hacking aimed at gaining secret access to a program, online service, or device. They are built into the original software, that gives the access to special functions, but are mostly used by the original programmer. A backdoor that is built into one operating system can be used on any computer that runs that software. A specific type of backdoor, called a Trojan Horse, appear to be legitimate program, but when clicked, it enacts an activity with malicious intent. Trojan Horses can be used to create vulnerabilities in a device. The backdoor may be used to gain access to passwords, delete data on hard drives, or transfer information within the cloud. Many systems that store information within the cloud fail to create accurate security measures. If many systems are connected within the cloud, hackers can gain access to all other platforms through the most vulnerable system.

Technology companies are getting instruction from government officials to program backdoors directly into their devices or services, even though it is creating a vulnerability for these devices. The FBI has found that the use of backdoors is an unrestricted avenue for anyone to change or edit the information on a software for their own purpose.

The term backdoor was widely adopted after the term trapdoor went out of use.