Attack surface

Share
Copied to clipboard!

Different points in software environments where an attacker can attempt to enter data or extract data.

Related
Honeypot
Back to glossary
Buy Bitcoin
& 150 other cryptocurrencies
Fast. Safe. Easy.
Register now
Cryptocurrencies are volatile. Trade at your own risk.
Binance logo

Can't find what you're looking for?

Request ContentContribute