DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2012/4

2011 1

Main topic: The conceptual, organizational and legal problems of computer security

 PUBLISHED: 06.12.2012

 rr These articles were subject to peer-to-peer review

6) Interview with Professor Martin Gill
The director of the British company, Research and Consultancy International, specializing in security and risk management, talked with the Editor-in-Chief of DSM, Jaroslav Dočkal. 

10) Interview with Dr. Markus Schmall
At the IS2 Conference, the Editor in Chief of DSM also interviewed another expert on computer security, this time from the German T-Mobile. The questions were focused on practical experience with the wider use of honeypots. 

14) The Security of the Registry of Inhabitants
Ondřej Steiner
The implementation of national registers created a large central database of personal and reference data that must be protected at all costs. The security of national registers is achieved by a combination of security measures both at the level of individual registers and at the level of the national register’s overall architecture and functionality. This article describes how security is implemented in the Registry of Inhabitants. 

18) Personal Data and Personal Rights Protection in the Light of Labour Relations
Veronika Chlpeková
This article focuses on the protection of personal data and personal rights, particularly concerning labour relations. To make these topics easier to grasp, some general rules are explained by stating specific examples. The article also describes which rights apply to people whose personal data has been unlawfully processed or whose personal rights have been unlawfully infringed. 

22) After the Rise of Cyberlockers, Can We Expect their Downfall?
Michal Beluský
This article briefly analyzes the legality of specific behavior which consists of downloading content protected by authorship rights (or copyright) from web-based services called cyberlockers. This type of conduct is being compared to similar behavior utilizing the BitTorrent service. The article continues with a commentary on the current state of affairs regarding cyberlocker-type services and concludes with a de lege ferenda reflection. 

25) Certification in ITIL 2011
Vladimír Kufner
The next part of the series on appropriate certifications for our readers describes the current qualifying scheme and an overview of the currently available ITIL certificates. 

26) PBX VoIP Security
Vladimír Toncar
Weakly protected VoIP PBX can become the cause of significant financial losses. This article describes a typical attack scenario and gives an overview of appropriate security measures. 

30) Criteria in ICT Public Tenders – Part II
David C. Hájíček
In the previous edition of DSM magazine, the topic of qualification and evaluation criteria used in the selection procedure for public contracts was discussed. Attention was primarily paid to the qualification criteria. In this article, the reader will find a discussion on the evaluation criteria that are mainly used in public contracts selection procedures, as well as the most frequent abuses of the Public Procurement Act. The second part of the article also includes advice on the options open to tender participants who believe the Act may have been breached. 

34) ITIL V3, 2011 Edition – Part IV
Vladimír Kufner
In the final section, the author summarizes their 5-year experience with implementing ITIL version 3. He starts with the negatives – the typical problems, the shortcomings of ITIL and the underestimated role of the human factor. He then proceeds by comparing the planned objectives of ITIL updates and reality. The author presents the actual percentage of ITIL adoption and the benefits actually achieved. Finally, there is a summary of other third party standards with which ITIL is often combined in order to achieve synergy effects. The article concludes with the author's predictions of how this standard will evolve in the future. 

40) Ensuring the Integrity of the Archive – Part I
Marta Vohnoutová, Rudolf Vohnout
In this first part of a two-article series, we will briefly discuss the theory of hash chains and linear schematics. In the second part of the series, we will introduce a product designed for electronic archives which is based on this theory.

The articles on pp. 12–24, 26–43 were subject to a review by the Editorial Board of DSM.

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top