Abstract:
The paper is devoted to the analysis of architectural vulnerabilities of the distributed information systems. Such vulnerability, which cannot be closed by the existing set of mechanisms of information security or for which ways of its closing are unknown, is called an architectural vulnerability in the distributed information systems. The examples of architectural vulnerabilities show that usually, these vulnerabilities are connected with the inadmissible or missed from attention interactions in distributed information systems. For closing or partial closing of architectural vulnerabilities, a special architecture which does not allow directly forbidden interactions was created. For this purpose, it is possible to use methods of restriction of influences of some components of distributed information systems on other components.
Keywords:vulnerabilities of distributed information systems; architectural vulnerabilities; methods of architectural vulnerabilities analysis.