{"title":"信息冲突条件下评价信息威胁的方法学","authors":"G. Shuklin","doi":"10.31673/2409-7292.2022.040002","DOIUrl":null,"url":null,"abstract":"The article analyzes modern methods of modeling informational influences, systematizes the problems of optimizing cyberspace protection systems against informational influences. Also, methods of assessing threats in cyberspace were studied and recommendations were developed for optimizing methods of protecting cyberspace from informational influences.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Methodology for evaluating informational threats in the conditions of informational conflict\",\"authors\":\"G. Shuklin\",\"doi\":\"10.31673/2409-7292.2022.040002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article analyzes modern methods of modeling informational influences, systematizes the problems of optimizing cyberspace protection systems against informational influences. Also, methods of assessing threats in cyberspace were studied and recommendations were developed for optimizing methods of protecting cyberspace from informational influences.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.040002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.040002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Methodology for evaluating informational threats in the conditions of informational conflict
The article analyzes modern methods of modeling informational influences, systematizes the problems of optimizing cyberspace protection systems against informational influences. Also, methods of assessing threats in cyberspace were studied and recommendations were developed for optimizing methods of protecting cyberspace from informational influences.