Return to Article Details Analysis of Existing Vulnerabilities in Information Reception, Processing and Transmission Systems in a Distributed Database Download Download PDF