The purpose of the article is to determine the functions of the libraries of Ukraine in the direction of the formation of information security of the state. The research methodology consists in the application of general scientific and special research methods: analysis, synthesis, generalisation, systematisation of materials, induction, and deduction. Scientific novelty. The views on the content of the concept of "information security" of foreign and domestic specialists were analysed. It was determined that "fakes" are only one of the types of information threats. The types of information threats have been established and the role and functions of library specialists have been determined in accordance with each of them in terms of preventing the occurrence and spread of inaccurate information. The main aspects regarding the formation of information security strategies by libraries of higher education institutions of Ukraine are considered. Conclusions. Information security is an important component of library activity. The entire set of measures is important for ensuring the security of information in the library and increasing users' trust in the library as a reliable source of information. To do this, the following practices should be used: protection of the network and library databases (containing not only metadata, but also full-text documents) from unauthorised access: installation of firewalls, anti-virus software, regular software and operating system updates; protection of confidential information: encryption of data, control of access to information, regular updating of passwords and verification of the security of third-party services; data backup: providing regular data backup to restore information in case of data loss or damage; employee training: training employees in the rules of information security, setting out the security policy, organising trainings and seminars. Keywords: library, information security, information threats, "fakes", unreliable information, information protection, social networks, messengers, information gatekeeper, blockchain, sentimental analysis.
Read full abstract