Return to Article Details Analysis of vulnerabilities in the network of second-tier banks and development of a methodology for their identification and elimination Download Download PDF