The paper has been devoted to the issues of authentication and authorization of users in systems running on the Internet are investigated, the problem of reliability of access and options for improving and enhancing the level of security and preservation of user data are considered. The article offers a solution to the problem of increasing reliability through the developed authentication system using the analysis of audio signals. The urgency of the work is that the problem of protection of user accounts becomes only more important with the spread of Internet technology in the lives of ordinary people.
 Проникнення інтернету в Україні. Available at: https://inau.ua/sites/default/files/file/1910/dani_ustanovchyh_doslidzhe... (Accessed 12 December 2021).
 Integrity, internal control and security in information systems: Connecting governance and technology ed.Michael Gertz, Erik Guldentops, Leon Strous. ISBN 1-4020-7005.
 Idrus Syed Zulkarnain S., Cherrier E., Rosenberger C., Schwartzmann J.-J. (2013), A Review on Authentication Methods. Australian Journal of Basic and Applied Sciences, 7 (5), pp. 95–107. ffhal-00912435
 Ometov, A. & Bezzateev, S. & Mäkitalo, N. & Andreev, S. & Mikkonen, T. & Koucheryavy, Y. (2018), Multi-Factor Authentication: A Survey. Cryptography. 2. 10.3390/cryptography2010001.
 RSA SecurID® 700 Authenticator. Available at: https://dustinimages.azureedge.net/media/d200001001274246/securid-authen... (Accessed 3 December 2020)
 MongoDB in Action Second Edition KYLE BANKER PETER BAKKUM SHAUN VERCH DOUGLAS GARRETT TIM HAWKINS ISBN: 9781617291609
 WAV File Format. Available at: https://docs.fileformat.com/audio/wav/ (Accessed 11 December 2021)