DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2011/3

2011 1

Main topic: Security of SCADA systems.

 PUBLISHED: 27.09.2011

6) Interview with Professor Danilo Gligoroski
The Editor-in-Chief of DSM spoke to Professor Danilo Gligoroski, professor of information security and cryptography at the department for telematics of the University for Science and Technology in Trondheim, Norway.

10) The Security Issues of SCADA Systems
Jaroslav Dočkal
One of the most interesting presentations at this year’s Black Hat related to SCADA systems. This article describes and, from the security point of view, analyzes the most common communication protocols used by these systems. It also gives an overview of the basic protocols that are used for SCADA security.

14) Intelligent Building Control Systems Security
Pavel Čeleda, Radek Krejčí 
This article explains intelligent building control systems security. Attention is paid to the security threats which can appear in intelligent building computer systems and recommendations on how to avoid them. 14

18) Behavioral Analysis of Network Attacks
Pavel Minařík
Behavioral analysis is an advanced technology supplementing antivirus software, firewalls and intrusion detection systems. This article will introduce the basic terminology of behavioral analysis and the creation of behavioral patterns and their use for the different tasks of detecting attacks and anomalies.

22) The Security View on NFC
Martin Henzl, Petr Hanáček
This article deals with the principles of NFC Technology (Near Field Communication), a technology used for mobile devices. This can be used for various interesting applications, not only in the field of mobile payments, but requires a careful analysis of the security aspects of its use.

26) Formats for Advanced Electronic Signatures – Part II
Libor Dostálek  
While the first part of the series dealt with the XAdES format, this part is devoted to another interesting format – CadES, which is based on the PKCS#7 standard. The long-term storage of electronic mail is used as an example.

30) The High and Low of the Elections – part III
Michal Altair Valášek, Vladimír Smejkal, Jindřich Kodl 
This part of a series on e-voting describes the principles and processes that could be used for electronic voting in the Czech Republic. This article comes to two conclusions – one optimistic, and one pessimistic.

34) Ballots over a Web Interface
Filip Jurnečka, Václav Matyáš 
Fraud related to ballots in public procurement has recently been a frequent topic of discussion. This article shows the possibilities for a web interface from this point of view.

39) Viral page - Facebook Popular with Hackers
Hackers are increasingly using Facebook to disseminate computer threats. The largest social media network provides them – due to the low security of most of the user accounts and the naivety of many people – with an ideal platform for their activities. Any change of layout or functionality immediately triggers an avalanche of attempts to compromise the computers of common users. The situation has not changed much in the past few months.

The articles on pages 10-38 were subject to an expert opponency by the Editorial Board of DSM.

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top