THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR. (2019). Information Systems and Technologies Security, 1(1), 19-26. https://doi.org/10.17721/ISTS.2019.1.19-26