Issues of information analysis and detection of destructive effects in cyberspace and across cyberspace are considered. In 2019, we confirmed the global trend in the growth of the number of users of social information network services. Therefore, the importance of ensuring the fulfillment of information and cyber security tasks in electronic media and cyberspace analysis is increasing today. Taking into account the global trends in the detection of destructive cyber influences and in order to fulfill the tasks defined by the governing documents of the state, it is necessary to monitor cyberspace and the detection of destructive cyber influences (at the stages of planning, preparation and direct information actions). To implement the above, it is necessary to address the issue of developing appropriate models and methods for the automatic detection of destructive cyber influences. In order to create a basis for scientific research, the following studies were conducted: methods of analysis of information available in cyberspace for the detection of destructive cyber influences; advantages and disadvantages of known methods of detecting destructive cyber-influences; known cyberspace monitoring systems. The main features (functions) of known cyberspace monitoring systems are: keyword data search and fixation of available information about information disseminators (their total number, activity over a certain period, actor accounts, gender, age, geographical location, audience reach). There is a need to identify approaches in developing decision support methods and models regarding the detection of destructive cyber influences in cyberspace. In developing an approach to detecting destructive cyber-influences, an ontology method is used in the first stage to structure information (text content rubrics). Advantages of using ontological diagrams in the process of information impact detection are: the presentation of the subject area (problems) in tabular or graph form, the detection of hidden relationships, the accumulation and analysis of information online, checking the consistency of facts. In the second stage, a filter-matrix is applied that reflects the processes (planning, preparation and direct implementation of information actions) of a classic NATO information operation. The prospect of further research is to develop a method for the automated detection of destructive cyber influences in cyberspace.