Return to Article Details APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES Download Download PDF