A method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders and malicious insiders.