FIELD: physics, computer engineering.
SUBSTANCE: invention relates to security of computer systems. Method of assessment of target computing environment security configuration include: a) scanning of identified IP-addresses and ports; b) dactyloscopic recording from detected open ports to detect services that were through; c) "fingerprinting" - determination of activity of said target environment; d) appealing to modules base and performing at least one of these modules which are designed to find vulnerabilities in the security system, available through IP-address and ports; in this case, at least one said module is executed based on its configuration; said target computer environment is used for business-critical applications execution, wherein at least one of said modules performs a method comprising: cc-1) recipients table search for remote function calls and other interfaces for application services associated with said targeted environment; cc-2) search of journal files with applications for said targeted environment; cc-3) determining of connections between different systems related to said targeted environment based on found recipients tables and journal files; cc-4) graphic display of determined connections; cc-5) provision of formed grafic display of determined connections to a user.
EFFECT: invention provides effective computer systems security.
9 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR OUTSIDE CONTROL OF THE CYBERATTACK SURFACE | 2021 |
|
RU2778635C1 |
SYSTEM AND METHOD FOR DEPLOYING PRECONFIGURED SOFTWARE | 2012 |
|
RU2541935C2 |
SEARCH FOR SECURITY PROBLEMS IN SOFTWARE AND OPERATING SYSTEMS IN PUBLIC CLOUDS | 2023 |
|
RU2825724C1 |
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE | 2021 |
|
RU2757651C1 |
MULTI-TUNNEL ADAPTER OF VIRTUAL COMPUTER NETWORK | 2015 |
|
RU2675147C1 |
METHOD FOR USING A MODEL OF THE IoT APPARATUS TO DETECT ANOMALIES IN THE OPERATION OF THE APPARATUS | 2021 |
|
RU2772072C1 |
METHOD FOR APPLYING PERSONAL DATA PROCESSING POLICIES FOR AN IoT DEVICE | 2021 |
|
RU2767714C1 |
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE | 2012 |
|
RU2523113C1 |
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK | 2021 |
|
RU2760625C1 |
METHOD FOR CONTROLLING AN IoT APPARATUS FROM THE SIDE OF AN ELEMENT OF THE NETWORK INFRASTRUCTURE | 2021 |
|
RU2769632C1 |
Authors
Dates
2018-06-08—Published
2011-07-01—Filed