Abstract:
The aim of this article is to consider the theoretical basis of automated system vulnerability scanning (assessment) process and to prove the possibility of determining the internal state distribution based on conducting the scanning process. According to international information security standards, the scanning process is called the vulnerability assessment process. Conducting this process and the existence of the required technical resources is a necessary condition for creating effective information security systems.