PRACTICAL ASPECTS OF USING CRYPTOGRAPHIC METHODS TO PROTECT DATABASES FROM UNAUTHORIZED ACCESS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.786

Keywords:

cybersecurity; cryptography; SQL; database; confidentiality; information security; hybrid warfare; cyberattacks.

Abstract

The article analyzes current cyber threats targeting Ukraine in the context of hybrid warfare, particularly attacks conducted by the Russian Federation. The analytical foundation of the study is based on official reports from the National Security and Defense Council of Ukraine, the general NATO report, and the 2024 report of the State Service of Special Communications and Information Protection of Ukraine. The main types of attacks identified within critical information infrastructure are systematized, with a focus on those directed at governmental agencies, energy, transport, and communication sectors. Based on the identified threats, the necessity to enhance the protection of information systems against unauthorized access is substantiated through the implementation of cryptographic methods. The study highlights the relevance of applying cryptographic mechanisms to ensure the confidentiality, integrity, and authenticity of data in digital environments. A conceptual software module was developed using a relational SQL database platform to store cryptographic keys, certificates, and encrypted user messages. The module enables controlled data management, providing multilevel user authorization and protecting information from unauthorized modifications. Experimental testing confirmed the effectiveness of the selected cryptographic methods and demonstrated their practical applicability in information security systems. The obtained results underscore the value of the proposed approach for strengthening cybersecurity in the face of modern threats.

Downloads

Download data is not yet available.

References

Nakonechna, E. (n.d.). Russian cyber operations. https://docs.google.com/viewer?url=https://cip.gov.ua

/services/cm/api/attachment/download?id=65897&embedded=true&a=bi

National Security and Defense Council of Ukraine. (2024). National Cyber Digest 2024. https://www.rnbo.gov.ua/files/2024/NATIONAL_CYBER_SCC/20240916/2024%2008%20Cyber%20digest_ENG.pdf

Davydiuk, V., & Potii, V. (2024). National Cybersecurity Governance in Ukraine. https://ccdcoe.org/uploads/2024/08/National-Cybersecurity-Governance_Ukraine_Davydiuk_Potii_2024.pdf

Rushchak, A. M., & Hulak, N. K. (2024). Cryptographic module for protection against unauthorized access. VII International Scientific and Practical Conference “World Educational Trends: Lifelong Learning in the Information Society”, 67–69.

Symmetric encryption. (n. d.). https://docs.google.com/viewer?url=https://cip.gov.ua/services/cm

/api/attachment/download?id=65897&embedded=true&a=bi

Lytvynenko, V. (n .d.). RSA encryption algorithm, types of attacks on it, and implementation in Python. https://dou.ua/forums/topic/43026/

Symmetric vs. Asymmetric Encryption: What’s the Difference? (n .d.). https://www.trentonsystems.com/en-gb/blog/symmetric-vs-asymmetric-encryption

Basic Principles of Functioning of the Hybrid Cryptographic System. (n .d.). https://ena.lpnu.ua:8443/

server/api/core/bitstreams/2ef4a067-2029-4f8e-bad5-cb78c05714d0/content

Python Standard Library. (n .d.). https://docs.python.org/uk/3.13/library/index.html

Cryptography Python module documentation. (n .d.). https://cryptography.io/en/latest/

Oracle. (n. d.). MySQL: Understanding What It Is and How It’s Used. https://www.oracle.com/mysql/what-is-mysql/

ITU-T Recommendation X.509. (2019). Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks. https://www.itu.int/rec/T-REC-X.509-201910-I/en

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Hulak, N., Ilyenko, A., & Dubchak, O. (2025). PRACTICAL ASPECTS OF USING CRYPTOGRAPHIC METHODS TO PROTECT DATABASES FROM UNAUTHORIZED ACCESS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 246–258. https://doi.org/10.28925/2663-4023.2025.28.786

Most read articles by the same author(s)

1 2 > >>