dsm 1997 2017


DATA SECURITY MANAGEMENT

The prestigious peer-reviewed scholarly magazine on information systems security, administration and risk management


ISSN 1211-8737
ISSN 2336-6745 (online)

info
About magazine
What's DSM, editorial board, peer review policy.
Let's Start...

archiv
DSM Archive
See the back issues for DSM

Check Archive...

ucet
My subscription
DSM subscriber section

READ DSM...

The current issue

2017 4 PC
Main topic:
Endpoint device security (IoT)

YEAR: 2017  |  ISSUE: 4  |  PUBLISHED: 18.12.2017
rr These articles were subject to peer-to-peer review.

 

Interview with national CERT teams

Adam Lamser
We asked the representatives of the CZ.NIC and GovCERT.CZ organizations about their stances and opinions on various topics like legislation, evaluation of one another or international coope-ration. The questions are structured to allow a direct comparison of the views of both entities on the given subject.
DSM | page 6

Bashware in Windows 10

David Pecl
This article provides an independent view to the attack method called bashware. It describes the principle and the phases of the attack. It includes the detection test of the three most  common antivirus software.
DSM | page 12

Endpoint protection in the age of cloud rr

Matej Zachar
It might seem that the importance of endpoint protection is nowadays descending - especially with adoption of systems, which save the data elsewhere. The article is focused on role of end-point in a context of overall data security. It discusses the influencing factors and summarizes the common trends.
DSM | page 17

Act on Cyber Security in new version rr

Lukáš Kintr, Martin Konečný
In previous articles, we introduced a new directive of the European Union, NIS Directive and some changes to the definitions and obligate entities that this directive reflected in the draft amendment to the Act on Cyber Security. However, this article provides up-to-date information on the already effective version of the revised Cyber Law and outlines other news related to the amendment.
DSM | page 21

About ePrivacy Regulation rr

Jaroslav Dočkal
This January, the ePrivacy Regulation (ePR) was launched, which should begin to apply at the same time as GDPR on May 25, 2018. The article attempts to explain how ePR and GDPR relate to each other. The focus in our article was put on the most important aspects of ePR – the area of unsolicited marketing, cookies and confdentiality.
DSM | page 26

Preparation for GDPR in practise – Part III. rr

Michal Nulíček
In this part of the series, we move on to the next two steps that cover the analytical part of the implementation project. That means an assessment of the differences between current and required status - GAP analysis and GDPR impact assessment on individual areas of the DPO's activities and design of the measures to ensure compliance with GDPR - impact analysis.
DSM | page 29

Case study – Implementation of GDPR in ČSOB rr

Richard Podpiera
In this case study we will get familiar with the process of implementation of GDPR in ČSOB bank. The article describes experience with practical implementation and covers topics such as client agreements, data governance, interaction with data subjects or revision of information systems and applications. In the conclusion, the reader is offered some recommendations to ensure the success of GDPR implementation.
DSM | page 32

Report from Cyber Coalition 2017

Adam Lamser
This report from one of the largest international cyber security exercise offers an authentic view of its course through the eyes of a direct participant. Are you wondering what traps are laid for the participants, how are these exercises conceived or what hides behind the not much--revealing press releases? The article contains both a description of the plot of the exercise and its detailed technical analysis.
DSM | page 35

 

VIEW ALL TOPICS FROM THIS ISSUE...

About DSM - peer-reviewed magazine

DSM (Data Security Management) magazine was established in the second half of 1997 to create a professional-level periodical magazine, which would bring high quality and up-to date information on the status and development in the area of information security. It publishes theoretical works, the results of research activities and practical applications, reviews and consultations. Top experts participate in creation of DSM, which guarantees a high quality of the contents.

Editorial Policies...


dsm about en

Get a subscription

  • Digital DSM Quarterly Magazine (Czech language ONLY)
  • Easy-to-download PDF format
  • Anytime, anywhere access for the subscribed content
  • Annual subscription or subscribe specific issues
  • Student discount - 15%
  • Bank transfer payment

Subscribe...

Annual subscription

year price
4 issues (latest + 3 upcoming)

Special price

One Issue

one price
One issue - latest or previous

See the back issues for DSM and all topics

  • DSM 2017/4 09-Oct-2017

    Main topic: Endpoint device security (IoT)

  • DSM 2017/3 09-Oct-2017

    Main topic: Identity, identification, authentication

  • DSM 2017/2 28-Mar-2017

    Main topic: Intelligent Network and security

  • DSM 2017/1 28-Mar-2017

    Main topic: Malware, adware, spyware, ransomware, allware … virus protection (principles, technology,...

  • DSM 2016/4 08-Dec-2016

    Main Topic: Internet of Things

  • DSM 2016/3 27-Sep-2016

    Main topic: eIDAS

  • DSM 2016/2 30-Jun-2016

    Main topic: Protection of personal data

Contact us

TATE International s.r.o.
Hořejší nábřeží 21
150 00 Praha 5

phone  Phone: +420 257 920 319
mobile  Mobil: +420 737 215 219
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 
Back to top