ability in figuring out weaknesses in devices, computer software, or networks that attackers could exploit. Using resources to scan for vulnerabilities and have an understanding of their opportunity affect is crucial https://macktechbiz.com/blogs/news