Survey of Approaches and Techniques for Security Verification of Computer Systems