1. 1
. Power R. 2002 CSI/FBI computer crime and security survey. Computer Security Issues and Trends VIII 1 (Spring 2002). 1. Power R. 2002 CSI/FBI computer crime and security survey. Computer Security Issues and Trends VIII 1 (Spring 2002).
2. 2
. Hayden M. V. The Insider Threat to U. S. Government Information Systems. Report from NSTISSAM INFOSEC /1-99 July 1999. 2. Hayden M. V. The Insider Threat to U. S. Government Information Systems. Report from NSTISSAM INFOSEC /1-99 July 1999.
3. 3
. Ferrie P. and Lee T. Analysis of W32.Mydoom.A@mm; http://securityresponse.symantec.com/avcenter/venc/ data/w32.novarg.a@mm.html. 3. Ferrie P. and Lee T. Analysis of W32.Mydoom.A@mm; http://securityresponse.symantec.com/avcenter/venc/ data/w32.novarg.a@mm.html.
4. 5
. See for example Microsoft Security Bulletin MS03- 050 Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code To Run: http: //www.microsoft.com/technet/security/bulletin/MS03- 050.mspx; or MS03-035 Flaws in Microsoft Word Could Enable Macros To Run Automatically: http://www.microsoft.com/technet/security/bulletin/ MS03-035.mspx. 5. See for example Microsoft Security Bulletin MS03- 050 Vulnerability in Microsoft Word and Microsoft Excel Could Allow Arbitrary Code To Run: http: //www.microsoft.com/technet/security/bulletin/MS03- 050.mspx; or MS03-035 Flaws in Microsoft Word Could Enable Macros To Run Automatically: http://www.microsoft.com/technet/security/bulletin/ MS03-035.mspx.