IDENTIFYING VULNERABILITIES IN A PREDEFINED SECURE COMPUTER SYSTEM AND NETWORK (SCSN)
Nikolay N. Hranov
In the present study, a well-founded goal is set to conduct tests to identify vulnerabilities in a protected computer system and network (SEC), which recreates the situation in the example computer system (in the form - organization X). An information security assessment requires resources such as time, personnel, hardware, and software. The development of a correct information security assessment methodology enables cost reduction through the possibility of re-using predefined resources (trained personnel and standardized testing platforms). Achieving security is an ongoing process and there is no way to once and for all say that it has been achieved. An important role in this process is the maximum optimization of the auditing of the systems and the identification of vulnerabilities, the purpose of which is the current research (ScienceDirect).
Keywords: Information Security, Cyber Threats, Cyber Security, Computer Security, Communication Security