security risk of various builds of vendor-provided hardware and software to find security flaws in it as a black-box - Develop...-provided hardware (such as whether there are security flaws in its boot process, etc.) - Perform penetration tests on yet...