A systematic scan of a computer’s ports that identifies open access points. Used in managing networks, port scanning also can be used maliciously to find a weakened point from which to break into a computer.
Sign up for our Newsletter
Learn about upcoming events, special offers from our partners and more.