simulation protection of objects of information systems, mathematical and information models of information security