1. FSTEC RF. Guidance document. Automated systems. Protection against unauthorized access to information. Classification of automated systems and requirements for information protection [El.res.]. URL: https://fstec.ru/tekhnicheskaya-zashchitainformatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/384-rukovodyashchij-dokument-reshenie-predsedatelyagostekhkomissii-rossii-ot-30-marta-1992-g (Date of circulation 06/20/2022). (In Russ)
2. FSTEC RF. Guidance document. The concept of protection of computer equipment and automated systems from unauthorized access to information [El. Res.]. URL: http://fstec.ru/component/attachment s/ 299 (date of access: 06/26/2022). (In Russ)
3. State Technical Commission of the Russian Federation. Guidance document. Computer facilities. Protection against unauthorized access to information. Indicators of security from unauthorized access to information. M.: Military Publishing House, 1992; 29. (In Russ)
4. Kotenko I.V., Saenko I.B., Polubelova O.V., Chechulin A.A. Application of Information and Security Events Management Technology for Information Protection in Critical Infrastructures. Proceedings of SPIIRAS. 2012; 20 (1): 27-56. (In Russ)
5. Gustavo González-Granadillo , Susana González-Zarzosa and Rodrigo Diaz Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures Sensors 2021; 21(14): 4759.