A type of security assessment that simulates a real-world attack on a computer or network system to test its vulnerabilities and defenses. It is used in cyber security to identify weaknesses and improve security measures. Examples include vulnerability assessments and red team exercises.
« Back to Glossary IndexPenetration Test
« Back to Glossary Index