IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS
The algorithm of ranking sources by potential used to identify malicious information in
social networks and the algorithm of ranking countermeasures used to counteract it is considered.
They allow you to achieve the required level of protection of users in social networks. Resource consumption,
efficiency and objectivity were selected as indicators of the criteria for the effectiveness
of the methodology processes. The resource consumption of processes is proposed to evaluate by
indicators: «The use of the central processor device», «The use of RAM» and «Operator operation
time». When comparing the processes with each other, we take the time of the measurements of
the algorithm for ranking sources by potential and sorting the objects of influence