The process of finding risks and vulnerabilities in computer networks, systems, hardware, applications, and other aspects of the IT ecosystem…