Computer containing hidden software that enables the machine to be controlled remotely, usually to perform an attack on another computer.

  • NOTE Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious activities under remote direction.

Source: ISO/IEC 27032:2015, Information technology — Security techniques — Guidelines for cybersecurity, First Edition, July 2012. Global Standards


A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.

Extended Definition: A member of a larger collection of compromised computers known as a botnet.

Source: NICCS™ Portal Cybersecurity Lexicon, National Initiative for Cybersecurity Careers and Studies (https://niccs.us-cert.gov/glossary) as of 11 November 2015, Global Standards