DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2010/1

2010 1

Main topic: Cybercrime, security of computer network.

 PUBLISHED: 09.03.2010

6) Interview with Karel Kuchařík
Karel Kuchařík is currently the head of the Cybercrime Department of the Criminal Police and Investigation Service of the Police of the Czech Republic. 

11) Forensic Investigation of Live Systems
Eva Racková
The forensic analysis of live (running) systems is a newly emerging discipline of forensic investigation. This article describes the basic principles and procedures involved in this field. 

14) Issues Related to the Prosecution of Computer Crime
Vladimír Smejkal  
The new penal code creates good opportunities to prosecute practically all forms of computer crime. Jurisdiction and evidence gathering issues for cross-border crime, especially involving the Internet still remain a problem. Investigations themselves also involve a number of issues: time authenticity, data readability (breaching protection rights), the identification and authentication of activities on a computer and the conclusivity of evidence in relation to the procedures used by experts. The author believes that the way to increased prosecution efficiency can be found in international treaties on cybercrime and the rigorous application of the appropriate methodologies. 

20) Digital Forensic Analysis and Information Security
Marián Svetlík 
The first part of this article describes the basic properties of digital forensic analysis and uses many practical examples to demonstrate how these properties are not being adhered to. The second part of the article describes the position and practical application of digital forensic analysis in the area of information security, specifically as part of responses to security incidents. 

24) Digital Evidence and its Properties
Roman Rak  
The term digital evidence is relatively new but has become a key element in forensic sciences. This article defines the term and analyzes its characteristics. Each characteristic has a description including the positive and negative aspects of its use in forensic practice. 

28) New Concepts of IDS for Wireless
Andriy Stetsko 
Networks This article provides an introduction to wireless sensor networks, the principles of their functioning and attacks on these networks together with protection mechanisms. Concepts for intrusion detection systems for these networks are discussed in more detail. The article also explains why intrusion detection systems for traditional metallic networks cannot be used for wireless sensor networks.

34) IDS – Anomaly Detection Methods
Vítězslav Čížek, Kateřina Dufková 
This article deals with methods of detecting statistical anomalies that can be used in IDS. It starts with an overview of the models of legal behavior of systems. The basic algorithms for analyzing short sequences of system calls are then demonstrated using an example.

38) NetFlow – Part I
Josef Kaderka 
NetFlow protocol is widely used by ISPs both for routine traffic monitoring and for calculating charges for transferred data. NetFlow protocol options are much richer and can be used for security purposes, especially when the data is obtained through the probe. This article is the first of two parts and provides general information about the NetFlow protocol.

40) The Way to Fibre Channel over Ethernet (FCoE)
Helena Jetelová 
This article describes the benefits of consolidating the inputs and outputs of servers in data centres using FCoE technology. Special attention is paid to explaining new performance and security mechanisms.

44) Fibre Channel over Ethernet (FCoE) Security
Jaroslav Dočkal 
This article explains why Fibre Channel (FC) technology has been selected as the basis for FCoE network security, the security standard which had to be quickly defined and the documents it had to be incorporated into. It also evaluates the security mechanisms used and draws attention to their weaknesses.

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top