Abstract:
In the paper the formal approach to vulnerability analysis based on mathematical security models of the computer systems is considered. The attacker model proposed in “Security assessment information technology criteria” is constructed and mathematical definition of the penetration stability is proposed in the terms of the DP-model.