Source: https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/Audit%20d%20un%20systeme%20d%20information.pdf