Defined term

Penetration Testing

Penetration Testing: An evaluation method that enables researchers to search for vulnerabilities in a system.

Also known as: Pen Testing

Alternative names:
Pen Testing
Verified
🏆 High Consensus
Cybersecurity

Definition

An evaluation method that enables researchers to search for vulnerabilities in a system. Election systems, such as the Voter Registration system, are periodically submitted to Penetration Tests to determine their vulnerabilities to cyber-attacks. Also called Pen Testing.

Alternative Definitions

Definition 2

Also called Pen Testing. An evaluation method that enables a researcher to search for vulnerabilities in a system. Election systems, such as the VR system, are periodically submitted to a Pen Test to determine their vulnerabilities to cyber attacks.

Source: The State and Local Election Cybersecurity PlaybookType: external
Definition 3

A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of an information system.

Source: Committee on National Security Systems Glossary CNSSI 4009-2015Type: standard
Definition 4

Security testing in which evaluators mimic real-world attacks in an attempt to identify ways to exploit, gain unauthorized access, or circumvent an application, system, or network.

Source: March 2020 CSC ReportType: external
Definition 5

Also called Pen Testing. An evaluation method that enables researcher to search for vulnerabilities in a system. Election systems, such as the VR system, are periodically submitted to Pen Test to determine their vulnerabilities to cyber attacks.

Source: EAC IT Glossary for Election OfficialsType: external
Definition 6

An evaluation method that enables researchers to search for vulnerabilities in a system.

Source: NIST Election GlossaryType: standard
Definition 7

A test methodology in which assessors, using all available documentation (e.g., system design, source code, manuals) and working under specific constraints, attempt to circumvent the security features of an information system. (SP 800-53A) (NISTIR)

Source: The Cyber GlossaryType: external
Definition 8

Vulnerability Testing

Source: Electronic Voting GlossaryType: external

Sources

1
Glossary of Election Terms, U.S. Election Assistance Commission (EAC)
View Source
2
The State and Local Election Cybersecurity Playbook
View Source
3
Committee on National Security Systems Glossary CNSSI 4009-2015
View Source
4
March 2020 CSC Report
View Source
5
EAC Glossary of Terms
View Source
6
EAC IT Glossary for Election Officials
View Source
7
EAC Information Technology Terminology
View Source
8
EAC Glossary of Election Terms
View Source
9
NIST Election Glossary
View Source
10
The Cyber Glossary
View Source
11
Electronic Voting Glossary
View Source

Continue Research

Browse the full glossary for adjacent terms, or subscribe for updates when definitions and sources are expanded.