Glossary -D - G

Exploit

By Mark Sharron | Updated 8 March 2024

Jump to topic

To breach a secure network in order to gain data or other assets.

complete compliance solution

Want to explore?
Start your free trial.

Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer

Find out more

Explore ISMS.online's platform with a self-guided tour - Start Now