An attempt to gain information about targeted computers and networks without actively engaging with the systems. -techtarget.com
« Back to Glossary IndexAn attempt to gain information about targeted computers and networks without actively engaging with the systems. -techtarget.com
« Back to Glossary Index