Description: The paper presents and analyzes a model of information security in information networks of the state. Based on the analysis of the overall process model of information security was presented a mathematical expression that describes this model as well as its shortcomings identified. Analyzed overall typical process model of information security threats with a certain overlap and model of information security system based on the relationship information security system, which allowed to present disadvantages of these models and submit them to the analytical expressions. These models should be used in the design phase of information security systems, has not yet been formed when the architecture of the system, and you need to give a preliminary assessment of the effectiveness of the protection of information designed. Analysis of models of models of access to information (Harrison model, multi-layered security, Clark-Wilson, etc.) allowed to present the shortcomings of modern models of information security in information networks of the state.
Keywords: model of information security, information networks of the state, the threat of unauthorized access, multilayered protection, information system threats