1. 1. Information technology. Security techniques. Information security management systems - Requirements: ISO/IEC 27001:2017.
2. 2. Kryterii otsinky zakhyshchenosti informatsii v kompiuternykh systemakh vid nesanktsionovanoho dostupu: ND TZI 2.5-004-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.ua/assets/files/ND-TZI-2.5-004-99.pdf.
3. 3. Terminolohiia v haluzi zakhystu informatsii v kompiuternykh systemakh vid nesanktsionovanoho do- stupu: ND TZI 1.1-003-99. [Chynnyi vid 28.04.1999]. K.: DSTSZI SBU, 1999. No. 22. URL: https:// tzi.com.ua/downloads/1.1-003-99.pdf.
4. 4. Cisco 2018, Annual Cybersecurity Report, Cisco Systems, February 2018.
5. 5. FBI/IC3: 2016 Internet Crime Report.