CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

DEVELOPMENT OF SOFTWARE FOR CENTRALIZED ELIMINATION OF HOST VULNERABILITIES UNDER THE MANAGEMENT OF UNIX-LIKE OPERATIONAL SYSTEMS

Read Gorkavenko Vladimir S., Azhmukhamedov Iskandar M. DEVELOPMENT OF SOFTWARE FOR CENTRALIZED ELIMINATION OF HOST VULNERABILITIES UNDER THE MANAGEMENT OF UNIX-LIKE OPERATIONAL SYSTEMS // Caspian journal : management and high technologies. — 2019. — №2. — pp. 135-143.

Gorkavenko Vladimir S. - undergraduate student, Astrakhan State University, slipmetal@mail.ru

Azhmukhamedov Iskandar M. - Doct. Sci. (Engineering), Professor, Head of the Department of Information Security, Astrakhan State University, iskander_agm@mail.ru

We consider one of the possible solutions to the problem of protecting unauthorized access of workstations running unix-like operating systems located on the same subnet through the development of a centralized vulnerability mitigation system that allows to increase the level of security. The developed software for centrally addressing host vulnerabilities under unix-like operating systems is described. A block diagram of a centralized system for eliminating vulnerabilities has been compiled and described. The main programming tools used to accomplish the development task are listed: programming language, frameworks, DBMS. The algorithm for analyzing and sending data is described, as well as the structure of database tables. A description of the main interfaces for the information security specialist and the system administrator with a centralized vulnerability management system is presented. A diagram of the sequence of actions of actors.

Key words: разработка системы защиты, системный администратор, информационная безопасность, защита информации, централизованная защита, Unix, linux, Ubuntu, protection system development, system administrator, information security, information protection, centralize