FIELD: computer security.
SUBSTANCE: computer-implemented method for detecting compromise of POS-terminal networks contains the following steps: obtaining identifiers of compromised territories; forming a database of potentially compromised POS-terminal networks; determining compromise parameters for at least one network of POS terminals; determining the probability of compromising at least one network of POS terminals; forming a list of POS-terminal networks ranked by the probability of compromise; identifying at least one network of POS terminals from the ranked list as compromised.
EFFECT: identification of compromised networks of POS terminals.
12 cl, 3 dwg
Authors
Dates
2023-03-22—Published
2021-11-22—Filed