Skip navigation

An attack on a network that takes advantage of a vulnerability, compromising its integrity, availability, or confidentiality.