“…A set of measures by the FSTEC was proposed to address information security [22]: identification and authentication of access subjects and access objects, access control of access subjects to access objects, limitation of the software environment, protection of machine media, check the security event, antivirus protection, intrusion detection (prevention), control (analysis) of data security, ensure the integrity of the information system and data, ensure the availability of data, protect the virtualization environment, protect technical means, protect the information system (i.e., its means, communication, and data transmission systems), identify incidents, and configuration management for the information s and data protection systems. Scientists and practitioners offer solutions to the above problems [10]- [18], [21], [26].…”