?
Sintez of security functions against cyber-attacks
The highest rates of development of infocommunication technologies, covering various subject areas relevant to humanity, raise new requirements for ensuring information security of risk objects. Cyber-attacks, as complex processes, are based on the latest infocommunication technologies, which causes the development of intellectual approaches to counteract them. To apply methods of artificial intelligence to counter information attacks, an approach is used based on the security functions of the risk object, which allows developing methodological recommendations focused on the potential of cloud computing. The article develops a method for synthesizing the security functions of the risk object from a cyber- attack based on calculus of graphs.