1. ISO/IEC 15408-2:2008 - Information technol-ogy - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=46414
2. ISO/IEC 15408-3:2008 - Information technol-ogy - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements. http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=46413
3. Ostapenko, G.A., Parinova, L.V., Belonozhkin, V.I., Bataronov, I.L. (2013). Informatsionnyye riski v sotsial'nykh setyakh. Monografiya. OOO "Izdatel'stvo "Nauchnaya kniga".
4. Borzenkova, S.YU., Kazarina, Ye.Ye. (2020). Analiz metodov urovnya zashchishchennosti informatsionnykh sistem v protsesse ikh ekspluatatsii. Izvestiya TulGU. Tekhnicheskiye nauki, 5, 93-97.
5. Polyanskiy, D.A., Monakhov, M.YU. (2012). Model' otsenki faktorov izmeneniya dostovernosti informatsii v korporativnoy seti peredachi dannykh. Izv. VUZov. Priborostroyeniye, 55(8), 39-43.