1. Positive technologies report “Cybersecurity 2020–2021”. https://www.ptsecurity.com/ru-ru/research/analytics/ kiberbezopasnost-2020-2021/. Cited February 21, 2021.
2. Smirnov, S.I., Eremeev, M.A., Gorbachev, I.E., Nefedov, V.S., and Izergin, D.A., Analysis of techniques and tools used by an attacker when moving horizontally in the corporate network, Zashchita Inf. Insaid, 2021, no. 1, pp. 58–61.
3. Makarenko, S.I. and Smirnov, G.E., Analysis of penetration testing standards and methodologies, Sist. Upr., Svyazi Bezop., 2020, no. 4, pp. 44–72. https://doi.org/10.24411/2410-9916-2020-10402
4. Frolov, P.V., Vershinin, E.V., and Medvedeva, S.A. Research of network attacks detection methods, Vopr. Radioelektron., 2019, no. 11, pp. 55–59. https://doi.org/10.21778/2218-5453-2019-11-55-59
5. Izergin, D.A., Eremeev, M.A., Magomedov, Sh.G., and Smirnov, S.I., Information security evaluation for Android mobile operating system, Russ. Tekhnol. J., 2019, vol. 7, no. 6, pp. 44–55. https://doi.org/10.32362/2500-316X-2019-7-6-44-55