N. V. Kornilovska, S. V. Vyshemyrska, M. Kolmykov


The information security is one of the widespread problems which the modern society is facing. The reason for the aggravation of this problem is the large-scale use of automated means of accumulation, storage, processing and transmission of information. The appearance of global computer networks has made it easy to access information for both individuals and large organizations. However, this achievement has led to a number of complex problems, including the problem of information security. The solution to the problem of information protection is associated with guaranteed information availability, its integrity and confidentiality.

The most significant threats to data security are: 1) non-automated access to information; 2) non-automated change of information; 3) non-automated access to networks and services; 4) other network attacks, such as the recurrence of previously intercepted transactions (groups of commands) and denial-of-service attacks.

A common method of protection in computer systems is the use of passwords which is more suitable for protecting access to computing resources than for protecting information itself. A password is a kind of shield that separates legitimate users from third party users, after which the authorized user gets the access to all information. The system of information protection involves the use of various methods of organizational-administrative, technological, technical, legal, moral-ethical nature. In addition, we can identify information technologies that include cryptographic and software means of information security.

Interactive environments are vulnerable from the data security position. An example of interactive environments is any of the systems with communication capabilities, such as e-mail, computer networks, the Internet. The information transmission through communication channels in the Internet is often risky. Being aware of effective security measures when using e-mail is becoming an urgent need for both organizations and citizens.

Keywords: Information security, cryptography, e-mail.

Повний текст:

PDF 106-112 (English)


Gutman B., Begville R. Safety policy when working on the Internet – a technical guide. – Available at:

Bashlam P.M, Babash A.V, Baranova EK Information security: a textbook – M .: Izd.tsentr EAOI, 2010. – 376 p.

Babash A.V Cryptographic and theoretical-automatic aspects of modern information protection. Cryptographic methods of protection. – М .: Publishing Center ЕАОІ, 2009. – 414 с.

Domarev V.V. Title: Information Technology Security. Methodology of creating protection systems. Publisher: TID Dia Soft, 2006. – 688 p.

Nielsen M., Chang I. Quantum calculations and quantum information / Per. from English Moscow, 2006; Gomonai O.V Lectures on quantum informatics: Textbook. way. V., 2006; Vasiliu E.V. Stability of quantum protocols for the distribution of keys such as "preparation-measurement" // Georgian Electronic Scientific J .: Computer Science and Telecommunications. 2007. № 2 (13);

Kilin S. Ya., Khoroshko D.B, Nizovtsev A.P. Quantum cryptography: Ideas and practice. Minsk, 2008; Korchenko O.G, Vasiliu E.V, Hnatiuk S.O. Modern quantum technologies of defense. information // Information protection. 2010. № 1.

Fedorov, D. Yu. Programming in the language of the high level of Python: a textbook for the applied bachelor's degree / D. Yu. Fedorov. —M. : Publishing Yrayt, 2017. —126 с. – (Series: Bachelor

CPython implementation detail:- Available at:


  • Поки немає зовнішніх посилань.