Return to Article Details PROCEDURES FOR INVESTMENT IN CYBER SECURITY, TAKING INTO ACCOUNT MULTIFACTORITY AND FUZZY STATEMENT Download Download PDF