Text this: Models and scenarios of implementation of threats for internet resources