This is an entry point, through either hardware or software that can give access to a computer and could be used to take partial or complete control of the system.