DATA SECURITY MANAGEMENT ARCHIVE

Browse an archive of past issues of our magazine

back  Back to DSM magazine...

DSM 2017/3

2017 3

Main topic: Identity, identification, authentication

 PUBLISHED: 09.10.2017

rr These articles were subject to peer-to-peer review

Click on headline to see more about article

Interview with Josef Postránecký

Pavel Krátký
In an interview with Mr. Josef Postránecký, Deputy Minister of the Interior Civil Service, who was appointed as a so called super-official from February 2015, we asked about Civil Service law, GDPR and even about the salaries of civil servants.
DSM | page 6

Consumer Identity and Access Management (CIAM) rr

Miloš Hurdálek
Author describes challenges related to providing access to applications for external identities of those not em-ployed with the organization, such as employees of partnering organizations and consumers. The article looks at finding answers to questions: how to perform identity registration; how to perform identity proofing; how to use appropriate and secure authentication? Article further explores capabilities, technologies and approaches related to CIAM.
DSM | page 11

Security aspects of videogame identities rr

Ondřej Koch, Anna Roubíčková
The article analyzes the security of personal data and virtual goods associated with playing video games. Following a brief historical excursion into the development of players’ identification, it focuses on the current principles of securing identities and on the authentication methods. Real-life examples illustrate the most common criminal practices associated with video game identities. The text evaluates how to protect yourself, and describes the still functioning effective methods of attack. In the end, the article briefly discusses the legal and social aspects of compromising the accounts.
DSM | page 17

Introduction to priviliged access management software rr

Michal Wojnar
The article describes privileged access management (PAM) and connected software solutions. Analysis of operation and implementation of software follows a simplified risk assessment of privileged user accounts. Emphasis should be put in particular on historical experience with identity management solutions. Focus is also on new perspectives in comparison to IdM as well as thoughts on the future development.
DSM | page 23

Security Framework for IIoT - Part IV. rr

Jaroslav Dočkal
The final part of the series is dedicated to areas that are often neglected in the IIoT, ie security configurations and management and security monitoring and analysis. The article provides a functional breakdown of these areas. Par-ticular attention is paid to „security policy“, which is seen in the article as an umbrella term for specific policy types.
DSM | page 26

Protecting back-bone from DDoS attacks rr

Pavel Minařík, Martin Žádník
Volumetric DDoS attacks represent a typical mean of disrupting online services. The impact of such attacks can be vital - let’s consider the impact in critical infrastructure, healthcare, banking or transport. The first line of defence can be applied in network infrastructure by telco operators. Such a defence is capable of stopping or minimizing the impact on end-users or services. Among the wide range of anti-DDoS techniques, this article selects and describes  typical ones and discusses their deployment.
DSM | page 30

Cyber Resilience rr

Josef Kaderka
The article focuses on resilience in the wider area of cyber security. It points to different conditions of building resilience in smaller organizations and large institutions or countries. It also provides selected information on NATO’s approach to this issue.
DSM | page 33

Preparation for GDPR in practise – Part II. rr

Michal Nulíček
This article elaborates the GDPR implementation process and analyzes it for purposes of the public. It discusses first two processes, which are necessary for GDPR implementation. They are the Consensus on Planning and Awareness Raising of GDPR and Mapping of Initial Processing. These processes are outlined as a concept, especi-ally with regard to the size, focus and other specifics of company.
DSM | page 39

Survey on the state of preparedness for GDPR in the Czech Republic rr

Radim Kolář
The article summarizes the evaluation of findings resulting from the survey on the preparedness of organizations in the Czech Republic for GDPR. The poll shows that most of the organizations are not yet ready, but they will probably not be ready in May 2018 and that many organizations have not yet understood what GDPR requires.
DSM | page 42

Virus section DSM | strana 47
The vulnerabilities DSM | strana 49
Standards & Publications DSM | strana 52
- Metamorfosa  DSM | strana 53
Information from partner companies DSM | strana 54

Legal section DSM | strana 55
Management summary DSM | strana 56
- Masthead  DSM | strana 57

back  Back...

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 
Back to top