<p style="margin-left:19.85pt;">In this article, the author presents concepts for exploring networks and com­munication security and recommendations for their use in the definition of requirements, reducing the risk of cyberattacks, and make some quantitative assessments. The focus is on the applications of graph theory in the analysis of communications and information networks.</p>