USE OF AUTOMATED SYSTEMS FOR VULNERABILITY DETECTION DURING INFORMATION SECURITY AUDITS
Abstract and keywords
Abstract (English):
The article will allow us to consider in detail the topic of information security audit using network analyzers and penetration tests, as well as to emphasize the importance of this process for organizations of any scale and field of activity in the context of the development of network technologies and the current geopolitical situation.

Keywords:
penetration testing, network analyzers, vulnerability, cyber-attacks, information security
References

1. Kiberbezopasnost' v 2023–2024 gg.: trendy i prognozy. Chast' tret'ya / // positive technologies : [sayt]. – URL: https://www.ptsecurity.com/ru-ru/research/analytics/kiberbezopasnost-v-2023-2024-gg-trendy-i-prognozy-chast-tretya/ (data obrascheniya: 09.09.2024).

2. Sharifov, B.A. Metodika provedeniya audita s ispol'zovaniem informacionnyh tehnologiy i personal'nyh komp'yuterov / B.A. Sharifov // Molodoy uchenyy. – 2021. – № 3 (345). – S. 332-335. EDN: https://elibrary.ru/ORYOCI

3. Makarenko S.I., Smirnov G.E. Analiz standartov i metodik testirovaniya na proniknovenie // Sistemy upravleniya, svyazi i bezopasnosti. 2020. № 4. DOI: https://doi.org/10.24411/2410-9916-2020-10402; EDN: https://elibrary.ru/ZVHQBR

Login or Create
* Forgot password?