FIELD: calculating; counting.
SUBSTANCE: invention relates to computer engineering. Technical result is achieved by a method of testing a system of software and hardware by an automated design system, in which modules of an automated design system: obtaining a formalized description of the architecture of the tested system and constructing a use model which includes: type of use of the system, a system element, a method for realizing said use; obtaining from a threat base a formalized description of known threats for systems similar to the tested one and constructing a threat model of the same type as the use model which includes: a threat type, a system element, a method for realizing a threat, a vector of effecting the system; comparing threat model with use model; detecting means of the tested system, which are vulnerable: to the type of unauthorized use of the system, to the method of realizing the threat, to the vector of action on the system.
EFFECT: technical result consists in providing detection of vulnerable software and hardware in the process of automated testing of a system of software and hardware.
15 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF AUTOMATED DESIGN ENGENEERING OF HARDWARE AND SOFTWARE SYSTEMS AND COMPLEXES | 2017 |
|
RU2659740C1 |
METHOD AND SYSTEM FOR AUTOMATED DOCUMENTATION OF SECURITY THREATS AND VULNERABILITIES RELATED TO AN INFORMATION RESOURCE | 2022 |
|
RU2789990C1 |
METHOD OF CONTROLLING PROTECTION SURFACE OF CORPORATE COMMUNICATION NETWORK | 2023 |
|
RU2824314C1 |
STRATEGIES TO STUDY VULNERABILITIES AND TO SUPPRESS VULNERABILITIES CAUSED BY CAPTURING ACCOUNT DATA | 2007 |
|
RU2462753C2 |
METHOD FOR ASSIGNING AN UNKNOWN DEVICE TO A CLUSTER | 2019 |
|
RU2747466C2 |
METHOD FOR FORMING DEVICE CLUSTERS | 2019 |
|
RU2747452C2 |
METHOD FOR DETECTING COUPLED CLUSTERS | 2019 |
|
RU2747451C2 |
METHOD OF ASSESSING EFFICIENCY OF PHYSICAL SECURITY SYSTEM OF IMPORTANT PUBLIC FACILITY | 2019 |
|
RU2724909C1 |
SOFTWARE AND HARDWARE COMPLEX OF THE DECISION SUPPORT SYSTEM FOR MANAGING THE RELAY PROTECTION SUBSYSTEM AND AUTOMATION OF A DIGITAL SUBSTATION IN THE CONDITIONS OF COMPUTER ATTACKS AGAINST IT | 2022 |
|
RU2798437C1 |
METHOD FOR IDENTIFYING SOFTWARE VULNERABILITIES FORMING THE CONDITIONS FOR INFORMATION SECURITY VIOLATION IN AN INFORMATION SYSTEM DUE TO A COMPUTER ATTACK | 2021 |
|
RU2783224C1 |
Authors
Dates
2020-02-21—Published
2018-04-19—Filed