The method of assessing the level of protection of the security forces of the reporting law and order, using three models of the object of protection as the list of vulnerabilities by evaluating nievaemyh-expert in the preparatory phase by attributing points Th-scale tyrehballnoy order according to certain rules. The models differ for once-categories of offenders. During the performance, using ex-pertnogo method determines the ratio of protection for a particular category offender to determine methods of the theory of fuzzy sets-level Protective lumination object protection "protected", "vulnerable" or "unprotected". Simplified od-bom calculates a predicted value of the coefficient of security.
information technology, the theory of fuzzy sets, category offender, the object of protection, vulnerability