The tools and methods used to penetrate security systems. Conducting security control testing, processing data, analyzing, and reporting. Facilitating security audits. Access control of information, ...