In a world where people are completely dependent on computer technology and information systems, the protection of information is of critical importance. The study presents an overview of some popular solutions for technical assessment of cyber threats in a risky, "sensitive" information environment, namely network management systems.