Involves providing an authorized simulated attack on a computer system, network or application to identify vulnerabilities.