Translated by L. Mukhortova
The problem of automation of the process of detecting weaknesses in information systems based on the analysis of its vulnerabilities is solved. The input data used for the classification, the process of their preparation, and the classification results are described. The interpretation and analysis of the results are presented. The problem solved is a part of the approach proposed by the authors to automatic formation of a set of required security tools for a particular information system. A necessary set of security tools is determined by the set of possible threats.