Watch this video on YouTube
Which security testing strategy involves using external individuals or a crowd to find security vulnerabilities in the software?