The set of actions that are carried out to detect vulnerabilities within a computerised system in order to improve security within an organisation. They aim to identify and address data breaches and threats in a network.
Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)