Системы управления, связи и безопасности 4. 2020 Systems of Control, Communication and Security
Скачать 1.07 Mb.
|
Системы управления, связи и безопасности №4. 2020 Systems of Control, Communication and Security ISSN 2410-9916 DOI: 10.24411/2410-9916-2020-10402 URL: http://sccs.intelgr.com/archive/2020-04/02-Makarenko.pdf 71 30. Kravchuk A. V. The model of process of remote security analysis of information systems and methods of improving it's performance. SPIIRAS Proceedings, 2015, vol. 38, no. 1, pp. 75-93 (in Russian). 31. Gorbatov V. S., Meshcheryakov A. A. Comparative analysis of computer network security scanners. IT Security, 2013, vol. 20, no. 1, pp. 43-48 (in Russian). 32. Herzog P. OSSTMM – The Open Source Security Testing Methodology Manual. New York, 2006. 129 p. Available at: https://www.isecom.org/OSSTMM.3.pdf (accessed 20 September 2020). 33. ISSAF - Information System Security Assesment Framework. 2006. 1264 p. Available at: http://www.oissg.org/issaf02/issaf0.1-5.pdf (accessed 20 September 2020). 34. OSWAP Testing Guide. Version 4. 2014. Available at: https://www.owasp.org/index.php/OWASP_Testing_Project (accessed 20 September 2020). 35. PTES – The Penetration Testing Execution Standard. 30 April 2012. Available at: http://www.pentest- standard.org/index.php/PTES_Technical_Guidelines (accessed 20 September 2020). 36. NIST Special Publications 800-115. Technical Guide to Information Security Testing and Assessment. USA, Gaithersburg, 2008. 80 p. Available at: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf (accessed 20 September 2020). 37. BSI – Study A Penetration Tesing Model. Germany, Bonn, 2008 111 p. Available at: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Penet ration/penetration_pdf (accessed 20 September 2020). 38. Klíma T. PETA: Methodology of information systems security penetration testing. Acta Informatica Pragensia, 2016, vol. 5, no. 2, pp. 98-117. 39. Orrey K. Penetration Test Framework. Vulnerability Assessment, 2014. Available at: http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html (accessed 20 September 2020). 40. Testy na proniknovenie [Penetration tests]. Positive Technologies, 2018. Available at: https://www.ptsecurity.com/ru-ru/services/pentest/ (accessed 20 Sep- tember 2020). 41. Avetisyan A. I., Belevantsev A. A., Chucklyaev I. I. The technologies of static and dynamic analyses detecting vulnerabilities of software. Voprosy kiber- bezopasnosti, 2014, vol. 4, no. 3, pp. 20-28 (in Russian). Статья поступила 02 октября 2020 г. Информация об авторах Макаренко Сергей Иванович – доктор технических наук, доцент. Веду- щий научный сотрудник. Санкт-Петербургский Федеральный исследователь- ский центр РАН. Профессор кафедры информационной безопасности. Санкт- Петербургский государственный электротехнический университет «ЛЭТИ» имени В.И. Ульянова (Ленина). Область научных интересов: сети и системы Системы управления, связи и безопасности №4. 2020 Systems of Control, Communication and Security ISSN 2410-9916 DOI: 10.24411/2410-9916-2020-10402 URL: http://sccs.intelgr.com/archive/2020-04/02-Makarenko.pdf 72 связи; радиоэлектронная борьба; информационное противоборство. E-mail: mak-serg@yandex.ru Адрес: 199178, Россия, Санкт-Петербург, 14 линия, д. 39. Смирнов Глеб Евгеньевич – соискатель ученой степени кандидата наук. Преподаватель кафедры информационной безопасности. Санкт-Петербургский государственный электротехнический университет «ЛЭТИ» имени В.И. Ульянова (Ленина). Область научных интересов: информационная без- опасность. E-mail: science.cybersec@yandex.ru Адрес: 197376, Россия, Санкт-Петербург, ул. Профессора Попова, д. 5. ______________________________________________________ Analysis of penetration testing standards and methodologies S. I. Makarenko, G. E. Smirnov Relevance. At present, the issues of security of information systems of critical infrastructure objects are becoming important. At the same time, the current tasks of the audit of information security (IS) of criti- cal infrastructure objects, as a rule, are limited to checking them for compliance with IS requirements. How- ever, with this approach to auditing, it often remains unclear the resistance of these objects to real attacks by malefactors. To check such stability, objects are subjected to a testing procedure, namely, penetration test- ing. Analysis of domestic publications in this area shows that there is no systematic approach to penetration testing in domestic practice. In this regard, it is relevant to analyze and systematize the best foreign ap- proaches and practices for penetration testing. The purpose of this paper is a comparative analysis of exist- ing foreign and domestic penetration testing techniques and standards. Results. The article presents the re- sults of the analysis of the following foreign standards and methods: OSSTMM, ISSAF, OWASP, PTES, NIST SP 800-115, BSI, PETA, PTF, as well as the domestic method Positive Technology. The elements of novelty of the paper are the identified features, advantages, disadvantages and the scope of applicability of existing standards and penetration testing methods. Practical significance. The material of the article can be used to form the initial data, the sequence of stages and their content, in a practical audit of the security of infor- mation systems of critical information infrastructure objects by penetration testing. Key words: penetration testing, standard, methodology, audit, information security, critical infor- mation infrastructure, information technology impact, information and psychological impact, OSSTMM, ISSAF, OWASP, PTES, NIST SP 800-115, BSI, PETA, PTF, Positive Technology. Information about Authors Sergey Ivanovich Makarenko – Dr. habil. of Engineering Sciences, Docent. Leading Researcher. St. Petersburg Federal Research Center of the Russian Academy of Sciences. Professor of Information Security Department. Saint Petersburg Electro- technical University 'LETI'. Field of scientific research: stability of network against the purposeful destabilizing factors; electronic warfare; information struggle. E-mail: mak-serg@yandex.ru Address: Russia, 197376, Saint Petersburg, 14th Linia, 39. Gleb Evgenevich Smirnov – doctoral candidate. Lecturer at the Department of Information Security. Saint Petersburg Electrotechnical University "LETI". Field of scientific research: information security. E-mail: science.cybersec@yandex.ru Address: Russia, 197376, Saint Petersburg, Professor Popov street 5. |