“…The methodology of adaptive risk assessment systems for the security of information system resources is considered in [14]. The analysis of the proposed methodologies in [8][9][10][11][12][13][14] showed that the authors use only individual components of information resource security, information security, as a rule, do not take into account the relationship between information assets, elements of the information infrastructure of the corresponding computer networks/systems, the possibility of integration and properties of hybridity of threats to security components [15][16][17]. Therefore, the reviewed methodologies will require a radical revision in terms of the creation of a methodological basis for building an information security system in CRES both of the world as a whole and of Ukraine in particular.…”