15 November 2013 Testing method which evaluates security of a computer system or network by simulating an attack from a malicious source.Usually they are conducted by specialized penetration testing companies.