1. 1. Risk Management - Vocabulary (ISO Guide 73:2009, IDT): DSTU ISO Guide 73:2013,1. Risk Management - Vocabulary (ISO Guide 73:2009, IDT): DSTU ISO Guide 73:2013,Kyiv, Minekonomrozvytku Ukrainy, 2014.
2. 2. Zubok, V. (2018), "Determining the ways of counteraction to cyberattacks on the Internetglobal routing", Elektronne modelyuvannya, Vol. 40, no. 5, pp. 67-76.
3. 3. "History of some BGP hijack, or whether it is necessary to filter fill-view from uplinks", availableat: https://nag.ru/articles/article/101232/istoriya-odnogo-bgp-hijack-ili-neobhodimo-lifiltrovat-full-view-ot-aplinkov.html (accessed January 21, 2019).
4. 4. "Internet Vulnerability Takes Down Google", available at: https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/ (accessed January 20, 2019).
5. 5. "China Telecom's Internet Traffic Misdirection", available at: https://internetintel.oracle.com/blog-single.html?id=China+Telecom%27s+Internet+Traffic +Misdirection (accessed January,2019).