1. /
  2. Security Response/
  3. Glossary/
  4. port scanning

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

port scanning

A technique that hackers use to find the weaknesses of a computer or network. While this technique is not an attack in reality, hackers use it to detect which ports are open on a computer. Based on the open ports information, unauthorized access can be gained. IT professionals also use this technique as a tool to discover and correct security holes.