9 Scientific, checking and supervision apparatus and instruments for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer networks security, namely, computer software, sensing and signaling devices, encoding and decoding apparatus for controlling network attacks; apparatus for recording, transmission or reproduction of sound or images; blank magnetic recording media; blank optical or sound recording disks; computers; data processing equipment, namely, computers, computer peripherals, electronic modules, telecommunication apparatus comprising communication hub, communication software, digital transmitter, optical data link, optical receiver and transceiver; computer hardware for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; software programs, particularly software for controlling network attacks in critical infrastructures, for filtering data flows in data systems, for guarantying conformity of data flow in networks systems, for maintaining complete isolation between two networks, using a hardware airlock, for responding to the functional need to feedback data to a control center, to simplify the integration within an existing system without increasing management workload, for guarantying computer security; tablet computers; smartphones; electronic book readers; computer software, namely, for computer security and protection of computer network; encoded integrated circuit cards in the nature of smart cards containing programming used for controlling computer network attacks