<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boyan Mednikarov</style></author><author><style face="normal" font="default" size="100%">Yuliyan Tsonev</style></author><author><style face="normal" font="default" size="100%">Borislav Nikolov</style></author><author><style face="normal" font="default" size="100%">Andon Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Hygiene Issues in the Naval Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber hygiene</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">main cyber hygiene rules</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">205-218</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the present study, the main characteristics and components of cyber hygiene as a subclass of cybersecurity are discussed. Based on institutional experience in the scope of security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in naval institutions is recommended. Main cyber hygiene definitions are given. Cyber hygiene software issues and institutional information security controls are analyzed. Malware infection as the main cyber hygiene concern is analyzed. Basic cyber hygiene instructions to ensure Internet users stay protected are defined.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">205</style></section></record></records></xml>