An act or event that occurs when a threat actor or unauthorized user achieves full access to normally restricted resources on a computing device’s operating system (OS) it has gained access to. Currently, there are two kinds: horizontal escalation, in which the actor assumes the identity of another user to gain his/her level of privilege; vertical escalation, in which the actor grants himself a higher access privilege by manipulating the system or taking advantage of its flaws.
Select your language