Main topic: Identity and Access Management; Law and IT
PUBLISHED: 12.03.2012
These articles were subject to peer-to-peer review
6) Interview with Ing. Petr Beneš
The IT Director of Česká spořitelna discussed the current issues involved with his work with the Editor-in-Chief of DSM, Jaroslav Dočkal.
9) ISO Standards Auditor Certification
Luděk Novák
This article deals exclusively with the ISO standards concerning management systems which are related to information technology. It sets out the certificates which can be obtained from the British Standards Institute and also the IRCA (International Register of Certified Auditors) and the itSMF (IT Service Management Forum).
10) Good Reasons for Solving Identity Management
Tomáš Fencl
Properly set time-plans and goals are the key to avoiding major failure during identity management implementation. Proper planning is also vital to keep the implementation and operational costs of the identity management system under control. This article contains the author's views on the common cost and timing issues involved based on his experience in identity management projects.
14) IAM – Project Pitfal
Marta Vohnoutová, Martin Čížek
ls from the Planning Phase to UsageIdentity and Access Management – IAM – implementation has a number of pitfalls for both implementers and organizations. This article describes the individual parts of a project and their typical issues – analysis, difficulties in communication, modeling the organization’s security policy, integrating IAM with other systems within an organization and making it accessible to its users. Emphasis is placed on Implementation being seen as a change management process affecting the whole organization.
18) Interview with Ing. Martin Čížek
Editor-in-Chief of DSM, Jaroslav Dočkal, talked to the Director of ORCHITECH about his experiences in IAM implementations.
24) Privacy Protection in Wireless Sensor Networks
Vašek Matyáš, Jiří Kůr
Wireless Sensor Networks can cause breaches in the privacy of monitored subjects. Sensitive information can be leaked from networks directly from sent packets or packet context. This article deals with techniques for protecting sensitive information and the problems which these techniques may cause.
26) Software License Management Issues
Július Šiška, Václav Mladěnka
What are the legal methods and processes used by software vendors to protect their intellectual property during the current software piracy climate? The approach of large software vendors, their software compliance programs and their maturity varies in the region, however the number of license audits being carried out is continuously increasing. For companies using software, Software Asset Management is a remedy against the unexpected expense of re-establishing compliance, which could run into millions of dollars.
30) Biometric Signatures – Myths and Facts
Jaroslav Tománek
This article deals with the assessment of dynamic biometric signature technology from the perspective of the requirements of the Act on Electronic Signatures. It also points out some unsolved shortcomings and suggests more adequate ways of using biometric signatures.
34) Formats for Advanced Electronic Signatures – Part IV
Libor Dostálek
This article deals with the electronic signature based on PKI in PDF documents. It sets out the formats for advanced electronic signatures in PDF – PAdES, and describes the differences between PAdES and the CAdES and XAdES formats.
38) ITIL V3, 2011 Edition – Part I
Vladimír Kufner
This article is the first in a series on the forthcoming update of ITIL V3, 2011 Edition. It summarizes the basic concepts, history, the reasons for the update and the ITIL portal on the internet. The article explains the basic changes performed in the updated key ITIL publications, including a consolidation of the terminology. It also discusses the changes in the structure of the covers the individual chapters of key publications. No less important is an introduction to the very latest process model and the latest list of processes.
The articles on pp. 10–43 were subject to a review by the Editorial Board of DSM.