Files
JargonFile/original/html/T/tiger-team.html
2014-03-27 18:54:56 +00:00

21 lines
3.2 KiB
HTML
Raw Permalink Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>tiger team</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../T.html" title="T"/><link rel="previous" href="tickle-a-bug.html" title="tickle a bug"/><link rel="next" href="time-bomb.html" title="time bomb"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">tiger team</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="tickle-a-bug.html">Prev</a> </td><th width="60%" align="center">T</th><td width="20%" align="right"> <a accesskey="n" href="time-bomb.html">Next</a></td></tr></table><hr/></div><dt><a id="tiger-team"/><dt xmlns="" id="tiger-team"><b>tiger team</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p> [U.S. military jargon] </p></dd><dd><p> 1. Originally, a team (of <a href="../S/sneaker.html"><i class="glossterm">sneaker</i></a>s) whose
purpose is to penetrate security, and thus test security measures. These
people are paid professionals who do hacker-type tricks, e.g., leave
cardboard signs saying &#8220;<span class="quote">bomb</span>&#8221; in critical defense
installations, hand-lettered notes saying &#8220;<span class="quote">Your codebooks have been
stolen</span>&#8221; (they usually haven't been) inside safes, etc. After a
successful penetration, some high-ranking security type shows up the next
morning for a &#8216;security review&#8217; and finds the sign, note, etc.,
and all hell breaks loose. Serious successes of tiger teams sometimes lead
to early retirement for base commanders and security officers (see the
<a href="../P/patch.html"><i class="glossterm">patch</i></a> entry for an example). </p></dd><dd><p> 2. Recently, and more generally, any official inspection team or
special <a href="../F/firefighting.html"><i class="glossterm">firefighting</i></a> group called in to look at a
problem.</p></dd><dd><p>A subset of tiger teams are professional
<a href="../C/cracker.html"><i class="glossterm">cracker</i></a>s, testing the security of military computer
installations by attempting remote attacks via networks or supposedly
&#8216;secure&#8217; comm channels. Some of their escapades, if
declassified, would probably rank among the greatest hacks of all times.
The term has been adopted in commercial computer-security circles in this
more specific sense.</p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="tickle-a-bug.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="../T.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="time-bomb.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">tickle a bug </td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"> time bomb</td></tr></table></div></body></html>