Москва
+7-929-527-81-33
Вологда
+7-921-234-45-78
Вопрос юристу онлайн Юридическая компания ЛЕГАС Вконтакте

Threats to information security. Vulnerability analysis of the system

Обновлено 20.01.2024 06:44

 

When building an information security system, it is necessary to determine what should be protected and from whom (or what) protection should be built. You should protect yourself from a variety of threats that manifest themselves through the actions of the violator. Threats arise if there are vulnerabilities in the system, that is, such properties of the information system that can lead to a violation of information security.

Determining the list of threats and building an intruder model is a mandatory stage in designing a security system. For each system, the list of the most likely security threats, as well as the characteristics of the most likely violator, are individual, so the list and model should be informal. The security of information is ensured only if the alleged threats and the qualities of the violator correspond to the real situation.

If there is a vulnerability in the system, a potential security threat can be realized in the form of an attack. It is customary to classify attacks depending on the goals, motives, the mechanism used, the place in the architecture of the system and the location of the intruder.

To prevent successful attacks, it is necessary to search and analyze system vulnerabilities. Vulnerabilities vary depending on the source of occurrence, degree of risk, prevalence, place in the life cycle of the system, and the relationship with the protection subsystems. Vulnerability analysis is a mandatory procedure for the certification of an informatization object. Due to the possibility of new vulnerabilities, they need to be periodically analyzed at an already certified facility.