Developing a methodological approach to assessing state information security

Keywords: information security, risks, threats to information security


The object of the research is the system of information security of the state.

Investigated problem: The experience of operations (combat operations) of recent years shows the growing role of information influence measures on the systems of collection, processing and transmission of special purpose information and decision-making officials.

The specificity of measures to ensure the information security of the state is that, on the one hand, it is necessary to solve the task of collecting, processing and transmitting information, and on the other hand, it is necessary to counteract measures of information influence on the systems of collecting, processing and transmitting information and decision-making officials.

Given this, information attacks have become a real threat and are one of the priority problems of national security and risk management. Information security covers all security measures that can be taken to protect against these impacts. A significant increase in the complexity and intensity of information attacks in recent years has forced most developed countries to strengthen their defenses and adopt national information security strategies.

The area of practical use of the research results: It is advisable to use the proposed scientific results when conducting research and development works on the creation of intelligent systems for collecting, processing and analyzing information about the state of information security of the state, and developing requirements for hardware and software of this type of systems.

Field of application: software, information systems, decision support systems.


Download data is not yet available.

Author Biographies

Roman Chunakov, Research Center for Trophy and Perspective Weapons and Military Equipment

Legal Department

Mykola Zaitsev, Taras Shevchenko National University of Kyiv

Educational and Scientific Institute of Public Administration and Civil Service

Andrii Shyshatskyi, Taras Shevchenko National University of Kyiv

Educational and Scientific Institute of Public Administration and Civil Service


Kuchuk, N., Mohammed, A. S., Shyshatskyi, A., Nalapko, O. (2019). The method of improving the efficiency of routes selection in networks of connection with the possibility of self-organization. International Journal of Advanced Trends in Computer Science and Engineering, 8 (1.2), 1–6.

Sova, O., Turinskyi, O., Shyshatskyi, A., Dudnyk, V., Zhyvotovskyi, R., Prokopenko, Y. et al. (2020). Development of an algorithm to train artificial neural networks for intelligent decision support systems. Eastern-European Journal of Enterprise Technologies, 1 (9 (103)), 46–55. doi:

Makarenko, S. I., Mikhailov, R. L. (2013). Otcenka ustoichivosti seti sviazi v usloviiakh vozdeistviia na nee destabiliziruiushchikh faktorov. Radioengineering and Telecommunication Systems, 4, 69–79.

Bodyanskyy, E. V., Strukov, V. M., Uzlov, D. Yu. (2017). Generalizedmetrics in the problem of analysis of multidimensional data with different scales. Zbirnyk naukovykh prats Kharkivskoho natsionalnoho universytetu Povitrianykh Syl, 3 (52), 98–101.

Semenov, V. V., Lebedev, I. S. (2019). Processing of signal information in problems of monitoring information security of unmanned autonomous objects. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 19 (3), 492–498. doi:

Zhou, S., Yin, Z., Wu, Z., Chen, Y., Zhao, N., Yang, Z. (2019). A robust modulation classification method using convolutional neural networks. EURASIP Journal on Advances in Signal Processing, 2019 (1). doi:

Shaheen, E. M., Samir, M. (2013). Jamming Impact on the Performance of MIMO Space Time Block Coding Systems over Multi-path Fading Channel. REV Journal on Electronics and Communications, 3 (1-2), 68–72. doi:

Malik, S., Kumar, S. (2017). Optimized Phase Noise Compensation Technique using Neural Network. Indian Journal of Science and Technology, 10 (5), 1–6. doi:

Rotshteyn, A. P (1999). Intellektual'nyye tekhnologii identifikatsii: nechotkiye mnozhestva, geneticheskiye algoritmy, neyronnyye seti. Vinnitsa: “UNIVERSUM”, 320.

Mazhara, O. A. (2015). Treat algorithm implementation by the basic matchalgorithm based on CLIPS programming environmen. Elektronnoye modelirovaniye, 37 (5), 61‒75.

Bolotova, S. Yu., Makhortov, S. D. (2011). Algoritmy relevantnogo obratnogo vyvoda na osnove resheniya produktsionno-logicheskikh uravneniy. Iskusstvennyy intellekt prinyatiye resheniyi, 2, 40‒50.

Zhyvotovskyi, R. M., Shyshatskyi, A. V., Petruk, S. N. (2017). Structural-semantic model of communication channel. Problems of Infocommunications. Science and Technology. Kharkiv, 524–529. doi:

Developing a methodological approach to assessing state information security

👁 24
⬇ 16
How to Cite
Andriishena, H., Chunakov, R., Zaitsev, M., & Shyshatskyi, A. (2023). Developing a methodological approach to assessing state information security. ScienceRise, (1), 16-23.
Innovative technologies in industry

Most read articles by the same author(s)