[Advenica. (2019). What is a data diode and how does it work? available at: https://www.advenica.com/en/blog/2019-02-19/what-is-a-data-diode-and-how-does-it-work.]Search in Google Scholar
[European Network and Information Security Agency. (2015). Definition of Cybersecurity, Gaps and overlaps in standardisation V1.0. Greece: Author.]Search in Google Scholar
[EUR-Lex Document 22003A0327(01). (2013). Agreement between the European Union and the North Atlantic Treaty Organization, available at: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:22003A0327(01)&from=EN]Search in Google Scholar
[Kassai, K. (2015). Elektronikus információbiztonsági alapismeretek a honvédelmi szervezetek által kezelt minősített adatok biztonsága érdekében, Hadmérnök, Vol. X, No. 1, 210-223.]Search in Google Scholar
[Koumartzis, N., & Veglis, A. (2011). Internet regulation: The need for more transparent Internet filtering systems and improved measurement of public opinion on Internet filtering. First Monday, Volume 16, Number 10, 1-17.10.5210/fm.v16i10.3266]Search in Google Scholar
[Lord, N. (2018). What is Advanced Threat Protection (ATP)?, Digital Guardian, available at: https://digitalguardian.com/blog/what-advanced-threat-protection-atp.]Search in Google Scholar
[Melnick, J. (2019). 10 Best Practices Essential for Your Data Loss Prevention (DLP) Policy, Netwrisk, available at: https://blog.netwrix.com/2019/07/16/10-best-practices-essential-for-your-data-loss-prevention-dlp-policy/.]Search in Google Scholar
[OPSWAT. (2020). Multiscanning, Advanced Threat Prevention with Simultaneous Anti-Malware Engines, available at: https://www.opswat.com/technologies/multiscanning]Search in Google Scholar
[Rababah, B., Zhou, S., & Bader, M. (2018). Evaluation the Performance of DMZ. International Journal of Wireless and Microwave Technologies, 2018-1, Vol. 8, Issue 1, 1-13.]Search in Google Scholar
[RedHat. (2018). What is malware? available at: https://www.redhat.com/en/topics/security/what-is-malware.]Search in Google Scholar
[Vacca, J. (2009). Computer and Information Security Handbook. Burlington. USA: Elsevier.]Search in Google Scholar
[Verma, R., & Agrawal, S. (2013). Data security for any organization by using public key infrastructure components and MD5, RSA algorithms. International Journal of Research in Engineering and Technology (IJRET), Vol. 2, Issue 5.]Search in Google Scholar