A form of cyber attack encoded in
innocuous-appearing data that is implemented by an individual or by software. A
data-driven attack is a major concern to system administrators because it may
get through the firewall in data
form and spearhead an attack against a system located behind the firewall. For
this reason, firewalls need to be programmed to recognize what data are allowed
for any protected application to be able to counter this form of attack.
Goldberg, I. Glossary of Information Warfare Terms. [Online, October 27, 2003.]
Information Warfare Website. http://www.psycom.net/iwar.2.html.