The process of probing a server or host for open ports to identify available services and potential vulnerabilities. While used legitimately for security auditing, attackers use port scanning to find entry points into systems.
Related Terms
Attack Surface
generalThe total number of possible entry points where an unauthorized user can attempt to enter or extract data from a system....
Penetration Testing
complianceAn authorized simulated cyberattack performed to evaluate the security of a system by actively exploiting vulnerabilitie...
Vulnerability
generalA weakness in a system, application, or process that can be exploited by a threat actor to gain unauthorized access or c...