Return to Article Details Ensuring cyber protection of a computer network object of information activity Download Download PDF