Searches for loopholes or vulnerabilities in a computer system, application or IT platform that could enable a cybercriminal to gain unauthorized access.
« Back to Glossary IndexSearches for loopholes or vulnerabilities in a computer system, application or IT platform that could enable a cybercriminal to gain unauthorized access.
« Back to Glossary Index