ANALYSIS OF THE SOFTWARE COMPLEX OF CRYPTOGRAPHIC INFORMATION PROTECTION
DOI:
https://doi.org/10.28925/2663-4023.2025.28.814Keywords:
cryptographic protection, software, encryption, VeraCryptAbstract
Information processing in the system means the performance of one or more operations, in particular: collection, input, recording, transformation, reading, storage, destruction, registration, acceptance, receipt, transmission, which are carried out in the system using hardware and software. In general, information with restricted access (critical information) requires protection, namely, confidential, proprietary or secret information (e.g., state secrets, banking secrets or other secrets). When processing restricted information, it must be protected from unauthorized and uncontrolled familiarization, modification, destruction, copying, dissemination, i.e., its basic security properties of confidentiality, integrity, accessibility and observability must be ensured. In particular, the transfer of proprietary and secret information from one system to another is carried out in encrypted form or via secure communication channels using technical and cryptographic information protection. The processed information is the object of protection.
Modern cryptographic systems provide data encryption to conceal its content, confirm its authenticity, integrity and authorship. Symmetric and asymmetric encryption methods are the basis for building data protection systems and guarantee their secure storage and transmission.
By conducting the analysis, we can gain the knowledge and skills to successfully implement data encryption, set up security policies, and create reliable mechanisms for protecting information in automated systems. To achieve this, it is necessary to implement a cryptographic protection software package that should ensure the confidentiality, integrity and availability of data. In the process, the functionality of the selected cryptographic protection software will be comprehensively tested. The knowledge and skills acquired in this task will allow you to confidently implement data encryption, set up security policies, and create reliable mechanisms for protecting information in automated systems.
Downloads
References
ELARTU – Instytutsiinyi repozytarii TNTU imeni Ivana Puliuia: Metodyka bezpechnoho zberihannia informatsii na tsyfrovykh nosiiakh. (n.d.). ELARTU – Instytutsiinyi repozytarii TNTU imeni Ivana Puliuia: Domivka. https://elartu.tntu.edu.ua/handle/lib/30605
VeraCrypt chy BitLocker: shcho krashche dlia shyfruvannia?. (n.d.). Nixj. https://nixj.ua/veracrypt-chi-bitlocker-scho-krasche-dlya-shifruvannya
Kozhukhar, O. (n.d.). Shcho take VeraSrypt ta yak vona dopomahaie prykhovuvaty faily na kompiuteri? https://cybercalm.org/novyny/shho-take-verasrypt-ta-yak-vona-dopomagaye-pryhovuvaty-fajly-na-komp-yuteri/
CivSocIT. Shyfruvannia dyska za dopomohoiu VeraCrypt na Windows dlia nedosvidchenykh korystuvachiv. (n.d.). Khabr. https://habr.com/ru/articles/558254/
Mieshkov, O. Yu. (2023). Kryptohrafiia ta kryptoanaliz: metodychni vkazivky do vykonannia laboratornykh robit dlia zdobuvachiv vyshchoi osvity spetsialnosti 125 “Kiberbezpeka”. Kremenchuk: Kremenchutskyi natsionalnyi universytet im. M. Ostrohradskoho.
Zavadskyi, I. Ya. (2019). Kryptolohiia: navchalnyi posibnyk. Lutsk: Vezha-Druk.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Юлія Черниш

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.