ARTICLE
TITLE

Methodical going near determination of sources of threats to informative safety in military sphere

SUMMARY

The methodical going is offered near determination of sources of threats to informative safety in a military sphere, that unlike existing takes into account informative possibility of every constituent of military organization. The use of such approach will give an opportunity to foresee possible changes in informative space. In accordance with the worked out methodology the quality estimation of descriptions that influence by weight of partial criteria of relative priority of threats of informative safety of the state in military spheres is conducted. Allows the features of ????????????? of complex informative threats : practically to estimate the state of informative safety after every sphere of national safety; purposefully to form and develop monitoring of external and internal threats to informative safety on the basis of the system of indexes of these threats; more reasonably to make decision in relation to the increase of informative strength security after all spheres of national safety.

 Articles related

Oleksandr Krainov,Roman Hrozovskyi    

The pace of development of information technology in recent years has prompted the introduction of computer technology in the processes of command and control. This, in turn, was reflected in the reverse side of this process, namely, interest grew in inf... see more


Yurii G. Danyk,Oleksandr Permiakov    

In the article has been analys of the current state and trends in the development defence tecnologys. Accomplished impact the high-tech on national security and defense. And accomplished problems of their implementation in the military field and ways of ... see more


Oleg O. Shkarlat,Roman M. Shtonda,Yulia A. Chernish,Maria M. Sulimovska    

The information security of the subject of the security activity, is in the protection of the interests of the security activity subject, connected with protection from unauthorized access to those data that are important in the work of the security acti... see more


Yunus Geçer,Recep Benzer    

In this study, it was aimed to review nationally and internationally published articles on issues such as “cyber threats, information security, adverse cyber behavior, cyber-human values and their sub-domains†between 2010 and 2018. A one-shot survey ... see more


???? ????????? ??????,?????? ???????? ????????    

The scientific article summarizes the main threats to national security, describes the operation of the Joint Forces in eastern Ukraine, border security and reveals the peculiarities of using forces and facilities of border guard detachments of the State... see more