A hardware or software-based hidden entrance to a computer system that can be used to bypass the system's security policies.