“…On the other hand, the value of the frequency estimate can be converted into the numerical equivalent of the probability of the threat occurrence, corresponding to a certain range of values. The results of the analysis of relevant sources [66,68,69] Then, using the well-known qualitative scales used in assessing information security risks [53,58,66,67], in particular, a three-level qualitative scale, we define the names of fuzzy variables-a set of values of a term-set T: T = {"low likelihood", "moderate likelihood", "high likelihood"} = {"L", "M", "H"}, that is α 1 = "L", α 2 = "M", α 3 = "H".…”