Return to Article Details Use of entropy approach for information security risks assessment Download Download PDF