Penetration test
Simulated cyber attack against a computer system, network, or web application to identify security vulnerabilities that an attacker could exploit. The process involves various stages, including planning, reconnaissance, scanning, gaining access, maintaining access, and analysis/reporting, and can be conducted manually or automated with software applications. Penetration testing is primarily targeted at organizations seeking to improve their security posture by identifying and mitigating potential security weaknesses.