Virtual penetration testing using threat analysis is disclosed. Threat
analysis may be achieved by evaluating attack paths and chain reactions
of compromised assets created by threats, threat agents, or threat
mechanisms. A threat agent having an existing access level is identified.
The existing access level is used to analyze an attack path between the
threat agent and an asset. The existing access level is updated if the
analysis of the attack path between the threat agent and the asset
indicates that an attack along the path would be successful.