Main topic: Security of mobile technologies and computer networks
PUBLISHED: 25.09.2012
These articles were subject to peer-to-peer review
6) Interview with Gidon Pely
The Vice President of Cyber Ark Software Ltd. for South/East Europe discussed on the topic of elimination of the risks associated with privileged accounts with the Editor-in-Chief of DSM, Jaroslav Dočkal.
10) Tablets and Smartphones, Deployment in Corporate Environments
Libor Michálek
Tablets and smartphones. These mobile devices bring new dimension to our life – to be online anytime and anywhere – to have possibility work anytime and anywhere. Ensure security on these devices has become a new challenge for corporations to protect their information. This article is dedicated to this issue from the perspective of the principles, good practice and experience of the author.
14) Security of Enterprise Mobile Devices
Petr Moláček, Radek Vajner, Jaroslav Dočkal
There is now a wide range of more or less advanced solutions for remote management on the market – there are known under the acronym MDM (Mobile Device Management). They are based on protocol EAS (Exchange ActiveSync) and they are founded on a wide range of mobile platforms. This article describes the possibilities the MDM devices to supplement EAS protocol. It states the characteristics should the customer emphasis in the selecting a specific product in this area.
18) Geolocation and Computer Networks Security
Pavel Čeleda, Josef Kaderka
This article explains how to determine a geographical location of users (devices) on Internet. Selected examples show threats which use the geolocation for new forms of attacks. Finally the attention is paid to use of geolocation in computer networks security and anomaly detection areas.
22) Application Flood Denial of Service Attacks
Vít Buka
During the last few years we could increasingly often encounter application denial of service attacks which are targeting webservers. In this paper, basic properties of these attacks are explained and a comparison with existing network denial of service attacks is provided. HTTP GET flood, Slowloris, R-U-D-Y and THC SSL DoS attacks are described in detail. Possible countermeasures against each of these attacks are discussed.
26) ISO 22301 has replaced BS 25999-2
Libor Široký
The world’s first certification standard for business continuity management systems (BCMS) BS 25999-2:2007 will be withdrawn on 1 November 2012. It will be replaced by ISO 22301:2012, the first international standard for BCMS certifications. The purpose of this article is to provide the reader with information about major changes the new standard brings. How this will affect organizations already certified to BS 25999-2 and those already in advance stage of BCMS implementation according to the old standard.
30) The three Realizations Reconnaissance based on Malware
Jaroslav Dočkal
Within one year, were gradually discovered three of the new type attack – remote controlled reconnaissance malware. This article describes how they are used in Windows weaknesses, communication protocols and cryptographic techniques. Compares the attacks themselves and put into context with the much discussed Stuxnet.
34) ITIL V3, 2011 Edition – Part III
Vladimír Kufner
How does it affect all lauded, but sometimes execrated cloud implementation of ITIL processes, respectively how does cloud affect the operation of the IT department? Does cloud turns out deployment at all stages of the service life cycle or only some of them? Again, with implemented processes do not have to do anything, or do we have to completely reconstruct the processes implemented? The author intends in general over the fact that the cloud can actually deliver the expected benefits, what are the risks, respectively, what are the conditions of success.
38) Privacy
David C. Hájíček
This article focuses on the suppliers selection procedure for public sector deals in the area of Information and Communication Technologies (ICT). The goal of this article is to summarize which qualifying and selection criterions for ICT deals in the public sectors are used, which of them are legal and what to bear in mind while preparing public tenders. The qualifying, as well as selection criterions mostly used in the area of ICT deals described, including the discussion of their legality and potential impact on the selection procedure. A short summary of legal procedures available for the protection of suppliers is also contained.
42) Formats for Advanced Electronic Signatures – Part V
Libor Dostálek
Article advocates dynamic biometric signature as an advanced electronic signature. It also deals with the use of other alternative electronic signatures and electronic signatures based on PKI. As an alternative electronic signatures mentions such signatures based on a shared secret or SMS signatures.
The articles on pp. 10–43 were subject to a review by the Editorial Board of DSM.