Skip to Main Content
This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.