The process of gathering information about the organization and its network activities and the subsequent process of identifying network assets by a potential attacker.
The process of gathering information about the organization and its network activities and the subsequent process of identifying network assets by a potential attacker.