21 lines
3.2 KiB
HTML
21 lines
3.2 KiB
HTML
<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?>
|
||
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>tiger team</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../T.html" title="T"/><link rel="previous" href="tickle-a-bug.html" title="tickle a bug"/><link rel="next" href="time-bomb.html" title="time bomb"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">tiger team</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="tickle-a-bug.html">Prev</a> </td><th width="60%" align="center">T</th><td width="20%" align="right"> <a accesskey="n" href="time-bomb.html">Next</a></td></tr></table><hr/></div><dt><a id="tiger-team"/><dt xmlns="" id="tiger-team"><b>tiger team</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p> [U.S. military jargon] </p></dd><dd><p> 1. Originally, a team (of <a href="../S/sneaker.html"><i class="glossterm">sneaker</i></a>s) whose
|
||
purpose is to penetrate security, and thus test security measures. These
|
||
people are paid professionals who do hacker-type tricks, e.g., leave
|
||
cardboard signs saying “<span class="quote">bomb</span>” in critical defense
|
||
installations, hand-lettered notes saying “<span class="quote">Your codebooks have been
|
||
stolen</span>” (they usually haven't been) inside safes, etc. After a
|
||
successful penetration, some high-ranking security type shows up the next
|
||
morning for a ‘security review’ and finds the sign, note, etc.,
|
||
and all hell breaks loose. Serious successes of tiger teams sometimes lead
|
||
to early retirement for base commanders and security officers (see the
|
||
<a href="../P/patch.html"><i class="glossterm">patch</i></a> entry for an example). </p></dd><dd><p> 2. Recently, and more generally, any official inspection team or
|
||
special <a href="../F/firefighting.html"><i class="glossterm">firefighting</i></a> group called in to look at a
|
||
problem.</p></dd><dd><p>A subset of tiger teams are professional
|
||
<a href="../C/cracker.html"><i class="glossterm">cracker</i></a>s, testing the security of military computer
|
||
installations by attempting remote attacks via networks or supposedly
|
||
‘secure’ comm channels. Some of their escapades, if
|
||
declassified, would probably rank among the greatest hacks of all times.
|
||
The term has been adopted in commercial computer-security circles in this
|
||
more specific sense.</p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="tickle-a-bug.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="../T.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="time-bomb.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">tickle a bug </td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"> time bomb</td></tr></table></div></body></html>
|