Share This Tweet A technique used to identify hosts/host attributes and associated vulnerabilities. -NIST.gov « Back to Glossary Index