“EXISTING SECURITY PROTOCOLS IN CFS” (2025) Information systems and technologies security, 2(8), pp. 66–73. doi:10.17721/ISTS.2024.8.66-73.