Main topic: Security of SCADA systems.
PUBLISHED: 27.09.2011
6) Interview with Professor Danilo Gligoroski
The Editor-in-Chief of DSM spoke to Professor Danilo Gligoroski, professor of information security and cryptography at the department for telematics of the University for Science and Technology in Trondheim, Norway.
10) The Security Issues of SCADA Systems
Jaroslav Dočkal
One of the most interesting presentations at this year’s Black Hat related to SCADA systems. This article describes and, from the security point of view, analyzes the most common communication protocols used by these systems. It also gives an overview of the basic protocols that are used for SCADA security.
14) Intelligent Building Control Systems Security
Pavel Čeleda, Radek Krejčí
This article explains intelligent building control systems security. Attention is paid to the security threats which can appear in intelligent building computer systems and recommendations on how to avoid them. 14
18) Behavioral Analysis of Network Attacks
Pavel Minařík
Behavioral analysis is an advanced technology supplementing antivirus software, firewalls and intrusion detection systems. This article will introduce the basic terminology of behavioral analysis and the creation of behavioral patterns and their use for the different tasks of detecting attacks and anomalies.
22) The Security View on NFC
Martin Henzl, Petr Hanáček
This article deals with the principles of NFC Technology (Near Field Communication), a technology used for mobile devices. This can be used for various interesting applications, not only in the field of mobile payments, but requires a careful analysis of the security aspects of its use.
26) Formats for Advanced Electronic Signatures – Part II
Libor Dostálek
While the first part of the series dealt with the XAdES format, this part is devoted to another interesting format – CadES, which is based on the PKCS#7 standard. The long-term storage of electronic mail is used as an example.
30) The High and Low of the Elections – part III
Michal Altair Valášek, Vladimír Smejkal, Jindřich Kodl
This part of a series on e-voting describes the principles and processes that could be used for electronic voting in the Czech Republic. This article comes to two conclusions – one optimistic, and one pessimistic.
34) Ballots over a Web Interface
Filip Jurnečka, Václav Matyáš
Fraud related to ballots in public procurement has recently been a frequent topic of discussion. This article shows the possibilities for a web interface from this point of view.
39) Viral page - Facebook Popular with Hackers
Hackers are increasingly using Facebook to disseminate computer threats. The largest social media network provides them – due to the low security of most of the user accounts and the naivety of many people – with an ideal platform for their activities. Any change of layout or functionality immediately triggers an avalanche of attempts to compromise the computers of common users. The situation has not changed much in the past few months.
The articles on pages 10-38 were subject to an expert opponency by the Editorial Board of DSM.