1. Informacionnye tehnologii i upravlenie predpriyatiem / V.V. Baronov, G.N. Kalyanov, Yu.N. Popov, I.N. Titovskiy. - M.: AyTi, 2009. - 328 s.

2. Romanec, Yu.V. Zaschita informacii v komp'yuternyh sistemah i setyah / Yu.V. Romanec, P.A. Timofeev, V.F. Shan'gin. - M: Radio i svyaz', 2001. - 376s.

3. Stel'mashonok, E.V. Zaschita informacii v komp'yuternyh sistemah / E.V. Stel'mashonok, I.N. Vasil'eva. - SPb. : Izd-vo SPbGEU, 2017. - 163 s.

4. Nenashev, A. The economics of introducing the peer-to-peer system of storage and processing of protected information at an enterprise / A. Nenashev, Khryashchev V., // XXI International Conference Complex Systems : Control and Modeling Problems (CSCMP), Samara, 2019. - Pp. 769-772. - DOI:https://doi.org/10.1109/CSCMP45713.2019.8976720.

5. Fedotov, A.M. Informacionnaya bezopasnost' v korporativnoy seti / A.M. Fedotov // Problemy bezopasnosti i chrezvychaynyh situaciy. - 2008. - № 2. - S.88-101

6. The Official Introduction to the ITIL Service Lifecycle. - London: TCO, 2007. - 238s

7. COBIT 5: Biznes-model' po rukovodstvu i upravleniyu IT na predpriyatii. - USA: ISACA, 2012.- 94s.

8. Sokolov, M.N. Problemy bezopasnosti Internet veschey: obzor / M.N. Sokolov, K.A. Smolyaninova, N.A. Yakusheva // Voprosy kiberbezopasnosti. - 2015. - №5 (13). - S. 32-35.

9. Construction and strategies in IoT security system / G. Quandeng, L. Yan, Y. Liu, Y. Li // IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, 2013. - Pp. 1129-1132. - DOI:https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.195.

10. Foster, R.N. Innovation: the attacker's advantage / R.N. Foster. - New York : Summit Books, 1986. - 316p.

11. Future Internet: The Internet of things architecture, possible applications and key challenges / R. Khan, S. Khan, R. Zaheer, & S. Khan // Frontiers of Information Technology (FIT), 2012 10th International Conference on, 2012. - Pp. 257-260. - DOI:https://doi.org/10.1109/FIT.2012.53.

12. Sherer, S. Information systems risks and risk factors: are they mostly about information systems? / S. Sherer, S. Alter // Communications of the AIS. - 2004. - № 14. - Pp. 29-64. - DOI:https://doi.org/10.17705/1CAIS.01402.

13. Classifying information systems risks: what have we learned so far? / M. Wiesche, H. Keskinov, M. Schermann, H. Krcmar // 47th Hawaii International Conference on System Sciences, Wailea, Maui, HI USA, 2013. - Pp. 5013-5022. - DOI:https://doi.org/10.1109/HICSS.2013.130.

14. Isaev, I.V. IT riski i informacionnaya bezopasnost' / I.V. Isaev // Sovremennye naukoemkie tehnologii. - 2014. - № 7-1. - S. 184-184.

15. Ponomarev, A.A. Ocenka i upravlenie riskami informacionnyh sistem / A.A. Ponomarev // Vestnik Udmurtskogo universiteta. Seriya «Ekonomika i pravo». - 2007. - № 6. - S. 155-166.

16. Oficial'nyy sayt TheOoL Project. - URL: https://theool.net/ (data obrascheniya: 12.04.2021).

17. ITIL® Service Operation. - London: TCO, 2011. - 370s.