Return to Article Details Mathematical Model of Information Security’s Threat Agent Download Download PDF