Any method by which authorized and unauthorized users are able to bypass normal security measures and gain access to an otherwise inaccessible system, especially an undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.