DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2011/4

2011 1

Main topic: Forensic investigation.

 PUBLISHED: 05.12.2011

6) Interview with Magdalena Klomfar
The Editor-in-Chief of DSM, Mr. Jaroslav Dočkal, talked to an employee of the department of computer analysis of the Institute of Criminology in Prague about her work.

10) Forensic Readiness is a Tool of the Future
Marián Svetlík
Forensic Readiness is a tool that, irrespective of its exotic name, provides another view on the efficient use of various data and metadata for the benefit of the organization. It views digital data as comprehensive information about the operations and activities in the organization. The article describes both the basic principles and the issues of implementation of Forensic Readiness under our conditions.

14) Forensic Analysis and Mobile Phone Security
Adrián Kováč, Miloš Orgoň
The SIM card of a mobile phone is a self-contained microcomputer that takes care of the identity of the user in the mobile network. This article describes what a SIM card can reveal about us and the way we use our mobile phone.

18) The Current Possibilities in the Battle Against Computer Crime
Vladimír Smejkal
The process from committing a crime to the punishment of the perpetrator is a long one and may not even be completed for many reasons. A number of acts that could be crimes remain undisclosed to the police or to the victims, or are not reported at all. The Agreement of the Council of Europe on Computer Crime introduced completely new factums. The problem that remains is how to detect these crimes in the first place.

24) Certificates not only for Signatures
Michal Altair Valášek, Vladimír Smejkal
This article deals with the issues of the certificates of Czech accredited certification authorities. It analyzes the technological and legal possibilities of their use for purposes other than electronic signatures, i.e., mainly for encryption and authentication.

30) WPA2: Inside Attacks
Petr Hanáček, Matej Kačic
This article deals with issues of security inside wireless networks. It describes in detail the vulnerability of the encryption key used for broadcast communications. The consequences of this vulnerability are then shown in possible types of attacks.

34) Formats for Advanced Electronic Signatures – Part III
Libor Dostálek
Due to its final form, the PDF format is the closest to the paper form of all the electronic formats. The question remains; where, and in which form, should the electronic signature be placed?

38) Selecting an Application Firewall
Petr Břehovský
The objective of this article is to acquaint the reader with the various options that an application based on a cheap web application firewall can bring. These possibilities are demonstrated on an open source WAF ModSecurity.

The articles on pp. 10–42 were subject to a review by the editorial board of DSM.

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top