The name given to a person who accesses computer networks by the backdoor. This can be for malicious intent but is just as likely to be performed by someone that is testing a system and looking for vulnerabilities to be fixed.
Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer
Find out more