Penetration Test on Various Information Assets