The act of scanning the ports on a remote computer in a systematic fashion.
The act of scanning the ports on a remote computer in a systematic fashion. By finding ports which are unsecured ("open") port scanning can be used to identify security vulnerabilities on a system. As such, it can be used as a tool both by systems administrators (to find and secure vulnerabilities on their systems), or by attackers (to find vulnerabilities to exploit).