Abstract:
The classification of information security threats from networking was based on the general scheme of networking, networks location, network infrastructure components relative to potential offenders. Furthermore, three classes of vulnerable parts of the system (software, hardware, man-made) were identified for convenience. The structuring method of objectives and functions was used for the analysis. According to it, the set of vulnerable sections and security threats is represented as a system of six levels, where the upper components — goals, and the bottom ones — functions, except for the level of the life cycle. The result is a system, where each vulnerable part can be compared with the list of threats to information security.
Keywords:vulnerability, network interaction, threats to information security, structuring of objectives and functions, operation system, network infrastructure, means of information security, privacy, availability, integrity.