Security breach. Corporate data leakage. Hacker attack. Multilevel network protection. Search for software vulnerabilities. Violation of the integrity and destruction of the system, irreparable damage