Return to Article Details Legal analysis of existing problems in the sphere of information security Download Download PDF