PRACTICAL ASPECTS OF USING CRYPTOGRAPHIC METHODS TO PROTECT DATABASES FROM UNAUTHORIZED ACCESS
DOI:
https://doi.org/10.28925/2663-4023.2025.28.786Keywords:
cybersecurity; cryptography; SQL; database; confidentiality; information security; hybrid warfare; cyberattacks.Abstract
The article analyzes current cyber threats targeting Ukraine in the context of hybrid warfare, particularly attacks conducted by the Russian Federation. The analytical foundation of the study is based on official reports from the National Security and Defense Council of Ukraine, the general NATO report, and the 2024 report of the State Service of Special Communications and Information Protection of Ukraine. The main types of attacks identified within critical information infrastructure are systematized, with a focus on those directed at governmental agencies, energy, transport, and communication sectors. Based on the identified threats, the necessity to enhance the protection of information systems against unauthorized access is substantiated through the implementation of cryptographic methods. The study highlights the relevance of applying cryptographic mechanisms to ensure the confidentiality, integrity, and authenticity of data in digital environments. A conceptual software module was developed using a relational SQL database platform to store cryptographic keys, certificates, and encrypted user messages. The module enables controlled data management, providing multilevel user authorization and protecting information from unauthorized modifications. Experimental testing confirmed the effectiveness of the selected cryptographic methods and demonstrated their practical applicability in information security systems. The obtained results underscore the value of the proposed approach for strengthening cybersecurity in the face of modern threats.
Downloads
References
Nakonechna, E. (n.d.). Russian cyber operations. https://docs.google.com/viewer?url=https://cip.gov.ua
/services/cm/api/attachment/download?id=65897&embedded=true&a=bi
National Security and Defense Council of Ukraine. (2024). National Cyber Digest 2024. https://www.rnbo.gov.ua/files/2024/NATIONAL_CYBER_SCC/20240916/2024%2008%20Cyber%20digest_ENG.pdf
Davydiuk, V., & Potii, V. (2024). National Cybersecurity Governance in Ukraine. https://ccdcoe.org/uploads/2024/08/National-Cybersecurity-Governance_Ukraine_Davydiuk_Potii_2024.pdf
Rushchak, A. M., & Hulak, N. K. (2024). Cryptographic module for protection against unauthorized access. VII International Scientific and Practical Conference “World Educational Trends: Lifelong Learning in the Information Society”, 67–69.
Symmetric encryption. (n. d.). https://docs.google.com/viewer?url=https://cip.gov.ua/services/cm
/api/attachment/download?id=65897&embedded=true&a=bi
Lytvynenko, V. (n .d.). RSA encryption algorithm, types of attacks on it, and implementation in Python. https://dou.ua/forums/topic/43026/
Symmetric vs. Asymmetric Encryption: What’s the Difference? (n .d.). https://www.trentonsystems.com/en-gb/blog/symmetric-vs-asymmetric-encryption
Basic Principles of Functioning of the Hybrid Cryptographic System. (n .d.). https://ena.lpnu.ua:8443/
server/api/core/bitstreams/2ef4a067-2029-4f8e-bad5-cb78c05714d0/content
Python Standard Library. (n .d.). https://docs.python.org/uk/3.13/library/index.html
Cryptography Python module documentation. (n .d.). https://cryptography.io/en/latest/
Oracle. (n. d.). MySQL: Understanding What It Is and How It’s Used. https://www.oracle.com/mysql/what-is-mysql/
ITU-T Recommendation X.509. (2019). Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks. https://www.itu.int/rec/T-REC-X.509-201910-I/en
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Анна Ільєнко

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.