A process used to determine that the security features of a system are implemented as designed. This includes hands-on functional testing, penetration testing, and verification.
A process used to determine that the security features of a system are implemented as designed and that they are adequate for a proposed application environment.
Testing which confirms that the program can restrict access to authorized personnel and that the authorized personnel can access the functions available to their security level.