4.3.7.5 Means of cryptographic protection of information on computers