Privilege escalation

An act or event that occurs when a threat actor or unauthorized user achieves full access to normally restricted resources on a computing device’s operating system (OS) it has gained access to. Currently, there are two kinds: horizontal escalation, in which the actor assumes the identity of another user to gain his/her level of privilege; vertical escalation, in which the actor grants himself a higher access privilege by manipulating the system or taking advantage of its flaws.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language