Simulating a cyber attack to identify vulnerabilities and weaknesses in a computer system or network.