Administration and management of information and cyber security; Information protection in information and communication systems. Cryptographic methods of information protection; Technical methods of information protection.