Testing how well the system protects against unauthorized internal or external access
Stress testing
Security testing
Compatibility testing
Comparison testing