Describes the act of attacking and ‘owning’ (gaining control of) a device, system or website which can then be bent to the attackers will, such as obtaining sensitive information like usernames and passwords.