Penetration tests
By means of tests consisting in conducting a controlled attack on the teleinformation system, aimed at practical assessment of the current security status of this system, in particular the presence of known vulnerabilities and resistance to attempts to break security, we analyze the system for the occurrence of potential security errors due to improper configuration, software gaps or equipment, weaknesses in technical or procedural means of security, and even insufficient awareness of users.