Source: http://c2i.unilim.fr/wp-content/uploads/sites/13/2015/10/Securite_et_protection_ordinateur-2015_07_13.pdf