Return to Article Details Analysis of weaknesses of the company's automated information security systems against insider attacks and methods for improving security Download Download PDF