Поддубний, В. О.Заболотний, В. І.Бойко, А. О.2020-01-132020-01-132019Поддубний В. О. Вплив вразливостей на функціональні послуги безпеки КСЗІ / В. О. Поддубний, В. І. Заболотний, А. О. Бойко // Global Cyber Security Forum : матеріали Першого міжнародного науково-практичного форуму, 14 – 16 листопада 2019 р. – Харьков : ХНУРЭ, 2019. – С. 84–85.http://openarchive.nure.ua/handle/document/10552While creating IT system, it is not impossible to make mistakes, sometimes they can be almost useless, but some of them can be used to attack the software or the system. An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware. Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service (DoS or related DDoS) attack. Nowadays there are several standards of information security management, such as ISO ISO/IEC 27000 series standards. The purpose of this work is to offer a model of the relationship between vulnerabilities and security services implemented in information and telecommunication systems. Such a system would allow assessing the impact of each of the vulnerabilities on each of the security services implemented in information and telecommunication systems with a comprehensive information security system. Such a model is needed to assess the risks to existing systems and to mitigate the transition to international standards.ukCVSSISO/IEC 27000вразливостісистеми управління вразливостямифункціональні послуги безпекиВплив вразливостей на функціональні послуги безпеки КСЗІConference proceedings