摘要 |
Current auditing systems do not audit the security of the functional layer of the system. The present invention provides systems and methods for security frameworks for assessing the vulnerabilities of a system that may be the target of a cyberattack. The system automatically performs security and compliance audits, detects technical security vulnerabilities, and illustrates the associated security risks with business-critical applications. Specifically, the system scans previously provided Internet Protocol (IP) addresses of a target computer system, fingerprints detected open ports to identify underlying services, and retrieves business critical information such as destination tables for remote function calls and other interfaces for application services, log files, connections between different systems. |