1. GOST R 56546-2015 National Standard of the Russian Federation. Protection of information. Vulnerabilities of information systems. Classification of vulnerabilities of information systems. Moscow: Standartinform (2018)
2. Stevens T., Ertan A., Floyd K., Pernik P.: Cyber Threats and NATO 2030: Horizon Scanning and Analysis [Electronic resource]. https://ccdcoe.org/uploads/2020/12/Cyber-Threats-and-NATO-2030_Horizon-Scanning-and-Analysis.pdf. Accessed 14 July 2022
3. Yu, O.V., Kondratyuk, A.P.: Evaluation of information in the interests of reflexive management of competitors. Softw. Prod. Syst. 2, 64–68 (2010)
4. Hentea, M.: Intelligent system for information security management: architecture and design issues. Issues Informing Sci. Inform. Technol. 4, 15–20 (2007)
5. Brotby K.: Information security governance. A Practical Development and Implementation Approach, pp. 185. Wiley, Hoboken (2009)