“THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR”. 2019. Information Systems and Technologies Security 1 (1): 19-26. https://doi.org/10.17721/ISTS.2019.1.19-26.