Cite

[1] Białas A., Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie, Publ. WNT, Warszawa 2007, pp. 10, 33, 43 [Information and services security within modern organizations and probabilities — available in Polish].Search in Google Scholar

[2] Committee on National Security Systems (CNSS) Glossary, CNSSI No. 4009, April 2015, pp. 50, 61.Search in Google Scholar

[3] Goodman M., Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko tobie, Publ. Helion, Gliwice 2016, pp. 208, 222 [Future Crimes: Everything is Connected, Everyone is Vulnerable — available in Polish].Search in Google Scholar

[4] NIST Special Publication 800-39, National Institute of Standard and Technology, Managing Information Security Risk Organization, Mission and Information System View, Information Security, March 2011, pp. B-1.Search in Google Scholar

[5] Ransom.Cryptolocker, [online], https://www.symantec.com/security-center/writeup/2013-091122-3112-99 [access 05.09.2019].Search in Google Scholar

[6] Shirey R., Internet Security Glossary, IETF 2000, RFC 2828, [online], https://www.rfc-editor.org/rfc/rfc2828.txt [access 18.03.2019].Search in Google Scholar

[7] Trend Micro, [online], https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.linux.setag.rpb [access 05.09.2019].Search in Google Scholar