The object of research. The study considers an effective method of assessing the information protection level in a computer network against unauthorized access based on the security graph.
 Investigated problem. Existing approaches to assessing the information protection level against unauthorized access have certain shortcomings: the real structure of computer networks is not taken into account, losses from unauthorized access are estimated in a monetary unit, which may not always be appropriate, the variability of modern cyber-attack scenarios and dynamic characteristics are not fully taken into account .
 The main scientific results. The results of the study showed that the proposed method of assessing the information protection level against unauthorized access in computer networks based on the security graph allows for a more accurate description of information resources due to their characteristic vulnerabilities. Based on the calculations of the security indicators of individual resources and the security of all information in the computer network, the ranking of risks and, accordingly, information resources according to the degree of criticality for the organization's activities is carried out. Recommendations have been developed to ensure the necessary information protection level against unauthorized access in the computer network.
 The area of practical use of research results. The results of the research can be used in practice in corporate computer networks of any organizations, since the proposed method for assessing the information protection level against unauthorized access is easily adapted to the specific needs of the organization, taking into account the specifics of its activities and business.
 Innovative technological product. The results of the study created an innovative strategy for assessing the information protection level against unauthorized access, which increases the control of information security and the compliance of computer networks with existing eligibility criteria.
 Scope of the innovative technological product. The results of the research and the created innovative strategies relate to the information security of computer networks of any organizations.