Open Access
SHS Web of Conferences
Volume 10, 2014
4th International Interdisciplinary Scientific Conference SOCIETY, HEALTH, WELFARE
Article Number 00007
Number of page(s) 7
Published online 08 September 2014
  1. Down P. (2012). Monitor All Employee Activity Across PCs, Laptops & the Internet, SpectorSoft Corp., published at
  2. Harris, S. (2003). All-in-one CISSP Certification Exam Guide (2nd Ed. ed.). Emeryville, California: McGraw-Hill/Osborne. ISBN 0-07-222966-7.
  3. Kroes N. (2012). European commissioner for digital agenda, speech video published at
  4. Llinás M. (2012). Moving Towards a European Cyber Security Strategy, European Network & Information Security Agency (ENISA), published at
  5. Seybert H. (2011). Internet use in households and by individuals in 2011, Eurostat, published at
  6. Vegetius, (4-5th century). Epitome of military science. Google Books. Vegetius has: Igitur qui desiderat pacem, praeparet bellum.
  7. AS/NZS (2009). AS/NZS 31000:2009 Risk management – Principles and guidelines. Australian and New Zealand risk management standard.
  8. ISO/IEC (2005). 27001:2005 Information technology – Security techniques – Information security management systems – Requirements. International Organization for Standardization and the International Electrotechnical Commission.
  9. LETA (2012). Rıga grimst tumsā datorsistēmu klūdas dēl [Due to mistakes in the system, Riga's many street lights did not work] Latvia: The National News Agency LETA published at
  10. Verizonbusiness (2012). Dat breach investigation report 2012. published at
  11. Anonymous (2013). CERT.LV re‘gistrētie zemas prioritātes incidenti no 01.01.2013. lıdz 31.03.2013. [Security incident reports on 2013 Q1] Latvia: Information Technologies Security Incidents Response Institution published at
  12. Anonymous (2011). European principles and guidelines for Internet resilience and stability. European Commission: published at
  13. Anonymous (2012). Pamatnostādnu projekts “Latvijas Informācijas tehnolonijas drošıbas stratē‘gija 2013–2018” [Draft Guidelines “Latvian Information Technology Security Strategy 2013–2018”] Latvia: Ministry of Transport published at