The modeling of an attack on a computer system or network. The purpose of the test is to identify vulnerabilities in the system and assess the possible damage caused by cybercriminal penetration. The pentest can be based on a closed system, where the attacker has no additional information about the target. Pentesting an open system involves providing the pentester with full information about it.