The process of examining a computer system in order to look for technical weaknesses that can be used to access the system. Usually carried out by employing software. An example would be the use of software to monitor insecurities associated with the port of a computer.