The practice of simulating attacks on a network or system to identify vulnerabilities and weaknesses.