On base of the analysis of the interaction of the logical chain of the source of the threats - a threats - a realization of the threats (the attacks) - a criticality - an objects - a consequences (the damage) - an actions of the reluctance is designed methods of the determination action reluctances information threat state in military sphere. Within the framework of brought methods estimation risk is realized by means of risk assessment possibility of the realization of the threats to safety, in accordance with criticality, inherent that or other object to information safety. The brought variant column analysis of the information threats and reluctances to him, which is built on result of the analysis.
information security, threats to information security, system of the reluctance, military sphere
"Metodyka vyznachennia zakhodiv protydii informatsiinym zahrozam derzhavi u voiennii sferi" [Methods of the determination information threats reluctances actions to state in military sphere],
Information Processing Systems,