JargonFile/original/html/T/tiger-team.html
2014-03-27 18:54:56 +00:00

21 lines
3.2 KiB
HTML
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>tiger team</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../T.html" title="T"/><link rel="previous" href="tickle-a-bug.html" title="tickle a bug"/><link rel="next" href="time-bomb.html" title="time bomb"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">tiger team</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="tickle-a-bug.html">Prev</a> </td><th width="60%" align="center">T</th><td width="20%" align="right"> <a accesskey="n" href="time-bomb.html">Next</a></td></tr></table><hr/></div><dt><a id="tiger-team"/><dt xmlns="" id="tiger-team"><b>tiger team</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p> [U.S. military jargon] </p></dd><dd><p> 1. Originally, a team (of <a href="../S/sneaker.html"><i class="glossterm">sneaker</i></a>s) whose
purpose is to penetrate security, and thus test security measures. These
people are paid professionals who do hacker-type tricks, e.g., leave
cardboard signs saying &#8220;<span class="quote">bomb</span>&#8221; in critical defense
installations, hand-lettered notes saying &#8220;<span class="quote">Your codebooks have been
stolen</span>&#8221; (they usually haven't been) inside safes, etc. After a
successful penetration, some high-ranking security type shows up the next
morning for a &#8216;security review&#8217; and finds the sign, note, etc.,
and all hell breaks loose. Serious successes of tiger teams sometimes lead
to early retirement for base commanders and security officers (see the
<a href="../P/patch.html"><i class="glossterm">patch</i></a> entry for an example). </p></dd><dd><p> 2. Recently, and more generally, any official inspection team or
special <a href="../F/firefighting.html"><i class="glossterm">firefighting</i></a> group called in to look at a
problem.</p></dd><dd><p>A subset of tiger teams are professional
<a href="../C/cracker.html"><i class="glossterm">cracker</i></a>s, testing the security of military computer
installations by attempting remote attacks via networks or supposedly
&#8216;secure&#8217; comm channels. Some of their escapades, if
declassified, would probably rank among the greatest hacks of all times.
The term has been adopted in commercial computer-security circles in this
more specific sense.</p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="tickle-a-bug.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="../T.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="time-bomb.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">tickle a bug </td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"> time bomb</td></tr></table></div></body></html>