Analysis of mathematical methods for dynamic management of cybersecurity resources of informatization objects