Nowadays, communication systems are an integral part of most technical solutions. The volume and value of the information transmitted are important characteristics that must be taken into account when building these systems. In this situation, the problem arises of ensuring the security of confidential information. The main threats to information security are data interception in order to use classified information, data modification in order to falsify transmitted information, data destruction to disrupt normal operation of the system. These types of information threats pose a particular danger to the information environment, because detecting them is a complex technical task. Problems caused by breaches of information security may result in financial losses for individuals and organizations as a whole, and also be of a strategic nature in a competitive struggle between opposing parties. In this situation, it is necessary to use a set of measures aimed at improving the level of protection of information flows and the information environment from undesirable influences.