December 3, 2024 by Aleksandr Oreshkin« Back to Glossary IndexSimulated cyberattacks against a computer system to find vulnerabilities that could be exploited by attackers. « Back to Glossary Index