dsm 1997 2017


DATA SECURITY MANAGEMENT

The prestigious peer-reviewed scholarly magazine on information systems security, administration and risk management


ISSN 1211-8737
ISSN 2336-6745 (online)

info
About magazine
What's DSM, editorial board, peer review policy.
Let's Start...

archiv
DSM Archive
See the back issues for DSM

Check Archive...

ucet
My subscription
DSM subscriber section

READ DSM...

The current issue

2016 3 PC
Main topic:
 SCADA, DevOps, Internet of things a smart city, ...

YEAR: 2019  |  ISSUE: 3  |  PUBLISHED: 24.9.2019

 

 

rr These articles were subject to peer-to-peer review.

Click on headline to see more about article

Interview with Robert Bigman

Adam Lamser
Robert Bigman, who has worked for Central Intelligence Agency (CIA) for numerous years, told us about the specifics of the job. He shared the risk management approach of the agency and outlined the types of incidents he had to solve during his career. Mr. Bigman explained how a true improvement in cyber security is hard to achieve without going through a previous failure and expressed his opinion on the Huawei case.
DSM | page 6

Incident management in compliance  with valid legislation – Part I. rr

Jaromír Veber
The miniseries focuses on how current legislation in the Czech Republic interferes with the incident management process. A general description of the security inci-dent management process as well as the relevant legislative requirements of selected essential laws (cyber security act in this part), including the affected parts of the process and the way of applying the legislation, is given. Readers thus may check whether their incident management process is appropriately set up or learn how to adapt the process to suit the legislation that applies to them.
DSM | page 12

PKI in cryptographic key management system – Part I. rr

Jiří Urbanec
The article (as the first part of a miniseries) focuses on the public key infrastructure as the one of the services used in an organisation. It finds motivational aspects for engaging the asymmetric key management system and discusses its involvement as the possible way for improving flexibility and agility of the organisation in the field of asymmetric key management. The system is also discussed as a tool for coping with diversity of processes of various PKI providers.
DSM | page 18

How to deal with risks – Part IV. rr

Petr Strnad
This article – a fourth instalment in a risk management miniseries – describes the main types of financial risks in banks and non-financial companies, their magnitude, management and measurement methods and related pitfalls.
DSM | page 23

Interview with Ján Uriga

Michal Wojnar
We questioned Ján Uriga, who is a behavioural psychologist focuses on business field, about the relationship between cyber security and psychology. He explained why it is convenient to have a person knowledgeable about behavioural sciences in any team. The recognition of va-lue of information – a core of any business activity – was discussed, including practical example from client environment. Finally, Mr. Uriga explained the concept of PwC Experience Center he is in charge of.
DSM | page 28

Open data rr

Jaroslav Tajbr
In the article the author provides an overview of the Czech legislation on open data. In the introduction the author describes the term open data, which he later puts into the context of Czech legislation, mainly the Act On Free Access to Information and Copyright Act – in particular when published data are subject to copyright as an author’s work or a database. He also mentions some major changes brought by General Data Protection Regulation (GDPR) to open data regulation. Furthermore the author provides some examples of Czech projects using open data.
DSM | page 32

DevOps – Part V. rr

Vladimír Kufner
This article (part of DevOps miniseries) is focused on security within DevOps („DevSecOps“). It points out specific vulnerabilities and possible threats, as well as key challenges that DevOps brings to the IT security. The text also discusses how DevOps influences other areas, and describes potential impact in case security within DevOps is not kept under control. In the final part, recommended principles and methods are examined.
DSM | page 36

Czech Telecommunication Office on its way  to the 21st century rr

Jaromír Novák
The article summarises development in the field of the telecommunications and role of the independent regulatory body, which changed significantly during the past decades. The office which used to be accountable for the number phone boots is now preparing the 5G frequency auction. The second half of the article is focused on the current key activities of the Czech Telecommunication Office.
DSM | page 42

 

VIEW ALL TOPICS FROM THIS ISSUE...

About DSM - peer-reviewed magazine

DSM (Data Security Management) magazine was established in the second half of 1997 to create a professional-level periodical magazine, which would bring high quality and up-to date information on the status and development in the area of information security. It publishes theoretical works, the results of research activities and practical applications, reviews and consultations. Top experts participate in creation of DSM, which guarantees a high quality of the contents.

Editorial Policies...


dsm about en

Get a subscription

  • Pritned and Digital DSM Quarterly Magazine (Czech language ONLY)
  • Easy-to-download PDF format
  • Anytime, anywhere access for the subscribed content
  • Annual subscription or subscribe specific issues
  • Student discount - 15%
  • Bank transfer payment

Subscribe...

Printed + digital subscription

price2189
4 issues

Digital subscription only

price1936
4 issues

See the back issues for DSM and all topics

  • DSM 2019/1 13-Dec-2018

    Main topic: Artificial intelligence, data centers,...

  • DSM 2017/4 09-Oct-2017

    Main topic: Endpoint device security (IoT)

  • DSM 2017/3 09-Oct-2017

    Main topic: Identity, identification, authentication

  • DSM 2017/2 28-Mar-2017

    Main topic: Intelligent Network and security

  • DSM 2017/1 28-Mar-2017

    Main topic: Malware, adware, spyware, ransomware, allware … virus protection (principles, technology,...

  • DSM 2016/4 08-Dec-2016

    Main Topic: Internet of Things

  • DSM 2016/3 27-Sep-2016

    Main topic: eIDAS

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

ibm industrial 300x250 en

 
Back to top