New issues of protection of sensitive information systems