Discusses techniques for assessing the strengths and weaknesses of a network by simulating an attack.