Return to Issue Details THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR Download Download PDF