1. [1] Bradley, N.: The Threat Is Coming From Inside the Network: Insider Threats Outrank External Attacks, Security Intelligence (online), available from <https://securityintelligence.com/the-threat-is-coming-from-inside-the-network/> (accessed 2022-07-29).
2. [2] Stefinko, Y., Piskozub, A. and Banakh, R.: Manual and automated penetration testing, Benefits and drawbacks, Modern tendency, 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pp.488-491, IEEE (2016).
3. [3] Shekhar, S.: Automated Penetration Testing, Manual, or Both? - What works best?, Breachlock (online), available from <https://www.breachlock.com/automated-penetration-testing-manual-or-both-what-works-best> (accessed 2022-03-29).
4. [4] Nessus: Nessus 8.15 User Guide, Tenable, Inc. (online), available from <https://docs.tenable.com/nessus/8_15/Content/PDF/Nessus8_15.pdf> (accessed 2022-08-04).
5. [5] Metasploit: Metasploit Framework User Guide version 3.1, Rapid7 (online), available from <http://cs.uccs.edu/~cs591/metasploit/users_guide3_1.pdf> (accessed 2022-05-14).