Information threat. Combating n-type information threats

Bohdan Krasiuk


An information threat is any activity aimed at violating the integrity, confidentiality, or availability of information in order to harm an individual, organization, or state.

In the context of information warfare, information threats can be used to discredit opponents, reduce public trust in certain individuals or organizations, or even interfere with electoral processes.

Information threats in information warfare can take various forms, for example:

  1. Fake news and information: dissemination of false or speculative information to influence public opinion.

  2. Hacker attacks: remote hacking of computer systems to steal sensitive information.

  3. Social engineering: abuse of trust in people to obtain confidential information.

  4. Phishing: sending emails that appear to be from well-known Internet services in order to gain access to confidential information.

  5. Spam: Sending a large number of unnecessary messages, which can affect network bandwidth and cause a denial of service.

To combat information threats in the context of information warfare, it is necessary to develop effective security measures. Information threats can spread in society at different levels and through different channels. Here are some of them:

  1. Social media: Social media have become the most common means of disseminating information in the modern world. Most information threats are spread through social media, where fake news, speculation, and propaganda can be disseminated.

  2. Emails and messages: Information threats can be spread through emails and messages that contain spam, phishing emails, viruses, and other harmful materials.

  3. Media: Traditional media, such as newspapers, radio, and television, can also dis- seminate information threats through their channels.

  4. Pyramid schemes: Pyramid schemes can be used to spread information threats, such as get-rich schemes and other types of fraud.

  5. The Internet: The Internet has become the most widely used means of communication in the world. Information threats can be disseminated through websites, forums, chat rooms, and other online resources.

Thus, the need and relevance of studying the spread and perception of information threats at the current stage of development do not require additional proof.

Повний текст:

PDF (English)


MykhaylovA. P., MarevtsevaN.A. Models of the information struggle, Mat. modeling, 2011, volume 23, number 10, 19 – 32

Albeverio S., Koshmanenko V., Samoilenko I. The conflict interaction between two complex systems. Cyclic migration

AlbeverioS., BodnarchukM., KoshmanenkoV. Dynamics of discrete conflict interactions between non-annihilating opponents

SamoilenkoI.V., NikitinA.V., VerovkinaG.V. Peculiarities of Construction and Anal- ysis of the Information Warfare Model with Markov Switchings and Impulse Per- turbations Under Levy Approximation Conditions. Cybern Syst Anal 57, 621 – 628 (2021).

Bekesiene S., Samoilenko I., Nikitin A., Meidute-Kavaliauskiene I. The Complex Systems for Conflict Interaction Modelling to Describe a Non-Trivial Epidemiological Situation. Math- ematics 2022, 10, 537 p.



  • Поки немає зовнішніх посилань.