Main topic: Security and cloud computing, security surveillance.
PUBLISHED: 10.03.2011
These articles were subject to peer-to-peer review
6) Interview with Juraj Rakovský
The Editor-in-Chief of DSM, Jaroslav Dočkal, interviewed the Chairman of the Board of Directors of ČD Telematika. This company specializes in the rail sector and also offers a wide range of information technology outsourcing services.
10) The Security Pitfalls of The IPv6 Protocol
Martin Elich, Pavel Čeleda
This article is focused on the security and new security threats associated with the onset of the IPv6 protocol. It includes practical experiences with using this protocol and recommendations for its deployment with regard to security.
14) How to Monitor the Vulnerability of the 50,000 machines
Daniel Kouřil, Michal Procházka
This contribution emphasizes the necessity of proper security updates for large-scale distributed environments and introduces the Pakiti system. Pakiti is open-source software allowing security operators to monitor the state of security updates and detect machines that are vulnerable to a particular exploit.
18) DNSSEC
Radim Peša, Bohuslav Moučka
This article briefly summarizes the history and current status of the DNSSEC protocol. It describes the weaknesses of DNS that are corrected by DNSSEC and also the principles behind the protocol. A simple description of the DNS server configuration with a DNSSEC extension is also included.
22) Does a Security Manager Want Cloud?
Jan Mikulecký
Cloud computing offers a new way of using information technologies and therefore new threats which have to be covered. A Security manager should know all the potential risks and the controls to treat them. It is impossible to avoid the cloud, therefore it is necessary to continuously establish confidence in cloud computing and to make maximum use of its potential.
26) Interview with Blake Sallé
Blake Sallé is a Vice-President of Global Sales at Cisco. He was interviewed at the Czech Cisco offices by the Editor-in-Chief, Jaroslav Dočkal, on new Cisco trends and technologies.
28) InfoStream – A Program for Secure Digital Document Capture
Jindřich Kodl, Vladimír Smejkal
Experts evaluate the Altairis, s.r.o. application for creating and maintaining time stamps for electronic documents. The article describes both practical experiences from product testing and security features.
32) Interview with Oskar Macek
The Editor-in-Chief of DSM, Jaroslav Dočkal, interviewed the chief expert for long-term digital document storage at the Ministry of the Interior of the Czech Republic.
34) Authorization of Access to an Internet Banking System
Petr Janda, Jiří Kaplický
A case study of a process for verifying identity when accessing the Mojebanka internet banking system. This article deals with looking for the right balance between the cost, security and user friendliness of the solution.
36) Random Number Generators
Václav Valenta
This article presents several random physical phenomena which can be used as a data source inside random number generator hardware. The principals and features of some random generator hardware which are used in praxis are also described.
40) The High and Low of the Elections – part I
Michal Altair Valášek, Vladimír Smejkal, Jindřich Kodl
This article deals with an electronic voting system. It describes the e-voting system and the experience gained from it. The article also discusses the purpose of e-voting and compares it with the method currently being used.
45) Viral page - Hazardous Social Networking
Each month ESET issues an overview of the most frequent computer threats. DSM previously used their data to review the period from September to October 2010. This time we look at the following three months; up to January 2011.
The articles on pages 10-44 were subject to an expert opponency by the Editorial Board of DSM.