A simulated cyberattack performed to identify security vulnerabilities in systems, networks, or applications.