Penetration Testing: Methods And Importance For IT Security