DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2015/3

2015 3

Main topic: Fraud in online environment and user behavior

 PUBLISHED: 24.9.2015

rr These articles were subject to peer-to-peer review

Click on headline to see more about article

Interview with James Kasprzak

Petr Hampl
Dr. Kasprzak, a lecturer who trains the leadership of the U.S. army, intelligence units, and other bodies of central government, explains his view of human brain operation and key priorities in any information protection strategy. He emphasizes that current identity leaks have resulted in irreversible changes in general understanding of privacy.

Interview with Alexander Kučera

Petr Hampl
A physician and a CEO of a small private clinic speaks about the reasons why he decided to move critical data into cloud. He also explains his view on benefi ts and risks of using external data centers and how his provider was selected. In his interview for Data Security Management, he also discusses reasons why physicians often fail in IT security issues.

Fraud detection in online environment – part II. rr

Jan Mészáros
The article introduces specifi c features of FDS (Fraud Detection System) in an organization delivering online services. It mainly focuses on the business, implementation, technical, and operational issues. It also describes key parameters for creating scenarios enabling fraud attempts identifi cation.

DDoS as a service rr

Vít Bukač
DoS (Denial of Service) attacks can be bought like any common business service and can used against any third party. The article describes the key features of this specific market and explains principal phases of an attack that is delivered as a service. The final part is dedicated to data flow identification.

Client identifi cation though voice biometry rr

Vladimír Matouš
A case study of implementation of automated voice recognition solution at Tatra banka starts with general explanation of voice recognition technology. The next part is focused on particular requirements of Tatra banka, including detailed goals of implementation. Description of implementation, processes and project results follows.

Pseudoanonymity – the Internet security risk rr

Jan Kolouch
The article, based on detailed analysis of Google’s EULA, shows some of risks, that users face using products and services of companies, such as Google, Microsoft, Apple etc. It is especially focused on personal data protection, especially its passing to third parties. Trade conditions of smart televisions and similar electronics are discussed as well.

Can be user’s adherence to security policies measured?

Petr Hampl
Authorities and universities have developed measures enabling comparison between organizations and groups of user in terms of safe behavior. At the same time, methodology for prediction of failing of particular employees has been developed.

back  Back...

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 
Back to top