Main topic: The new approaches to ICT security
PUBLISHED: 12.03.2013
These articles were subject to peer-to-peer review
6) Interview with David Pavlis
The director of the Czech company, Javlin, which developed its own platform for data integration, talked with the Editor-in-Chief of DSM, Jaroslav Dočkal. 6
10) Identity Management and Access Control in Cloud Applications
Marek Kumpošt
This article deals with issues of identity management within the cloud environment. The outsourcing of identity management to an external provider is a complex procedure that involves serious considerations regarding the security and transfer of sensitive information. We survey the possibilities for identity management that are available for both businesses and single users.
14) The ORG Information System and Basic Registers Systems
Eva Vrbová
This article explains how to identify individuals in basic registers systems and describes the properties of the newly designed ZIFO and AIFO identifiers. The article also explains in detail the method for generating identifiers and outlines the safety aspects that may affect the life cycle of ZIFO and AIFO.
18) COBIT 5 for Information Security
Luděk Novák
COBIT 5 for Information security is a new methodology for information security governance and management published by ISACA last year. The methodology extends the COBIT 5 Framework for information security. The complex methodology is based on seven enablers; principles, processes, organization structures, culture, information, services and people which are described in the article.
22) HTML5 Security
Zdeněk Říha, Jaroslav Dočkal
A new version of HTML is coming out after a number of years. This article focuses on the security issues of HTML5. It covers new tags, a relaxing of the Same Origin Policy, new features of the IFRAME tag and mentions some attacks demonstrated with the help of HTML5.
28) There’s no PDF/A, like PDF/A
Libor Dostálek, Iva Dostálková
With the increase in the number of electronically filed documents there is also an ever greater need for the long-term preservation of electronic documents. The choice of format for long-term preservation is increasingly important. PDF/A is currently considered as being the format for long-term preservation, however, there are associated risks which are discussed in the article.
34) Monitoring Employees – Part I
David C. Hájíček
This article analyses the legal aspects of the privacy protection of employees. The main types of privacy violations are identified, where employers perform checks on their employees, mainly in the information and communication technology environment. It also includes a breakdown of the main consequences of the disproportionate violation of employee privacy.
38) Ensuring the Integrity of the Archive – Part II
Marta Vohnoutová, Rudolf Vohnout
A digital archive ensures the archive integrity and proof of origin mainly by using more than one method. These are combined and their features complement one another. Both the proof of archive integrity and the proof of origin of particular stored documents are essential for the trustworthiness of the whole archive. As time goes by, two groups have emerged promoting two different strategies: 1. The protagonists of endless time-restamping of stored objects. 2. The protagonists of the opinion that it is not necessary to resolve the archive integrity by technical means. This article points out that a third solution could be the right one.
The articles on pp. 10–42 were subject to a review by the Editorial Board of DSM.