dsm 1997 2017


The prestigious peer-reviewed scholarly magazine on information systems security, administration and risk management

ISSN 1211-8737
ISSN 2336-6745 (online)

About magazine
What's DSM, editorial board, peer review policy.
Let's Start...

DSM Archive
See the back issues for DSM

Check Archive...

My subscription
DSM subscriber section


The current issue

2017 3 PCMain topic: Identity, identification, authentication

YEAR: 2017  |  ISSUE: 3  |  PUBLISHED: 9.10.2017
rr These articles were subject to peer-to-peer review.


Interview with Josef Postránecký

Pavel Krátký
In an interview with Mr. Josef Postránecký, Deputy Minister of the Interior Civil Service, who was appointed as a so called super-official from February 2015, we asked about Civil Service law, GDPR and even about the salaries of civil servants.
DSM | page 6

Consumer Identity and Access Management (CIAM) rr

Miloš Hurdálek
Author describes challenges related to providing access to applications for external identities of those not em-ployed with the organization, such as employees of partnering organizations and consumers. The article looks at finding answers to questions: how to perform identity registration; how to perform identity proofing; how to use appropriate and secure authentication? Article further explores capabilities, technologies and approaches related to CIAM.
DSM | page 11

Security aspects of videogame identities rr

Ondřej Koch, Anna Roubíčková
The article analyzes the security of personal data and virtual goods associated with playing video games. Following a brief historical excursion into the development of players’ identification, it focuses on the current principles of securing identities and on the authentication methods. Real-life examples illustrate the most common criminal practices associated with video game identities. The text evaluates how to protect yourself, and describes the still functioning effective methods of attack. In the end, the article briefly discusses the legal and social aspects of compromising the accounts.
DSM | page 17

Introduction to priviliged access management software rr

Michal Wojnar
The article describes privileged access management (PAM) and connected software solutions. Analysis of operation and implementation of software follows a simplified risk assessment of privileged user accounts. Emphasis should be put in particular on historical experience with identity management solutions. Focus is also on new perspectives in comparison to IdM as well as thoughts on the future development.
DSM | page 23

Security Framework for IIoT - Part IV. rr

Jaroslav Dočkal
The final part of the series is dedicated to areas that are often neglected in the IIoT, ie security configurations and management and security monitoring and analysis. The article provides a functional breakdown of these areas. Par-ticular attention is paid to „security policy“, which is seen in the article as an umbrella term for specific policy types.
DSM | page 26

Protecting back-bone from DDoS attacks rr

Pavel Minařík, Martin Žádník
Volumetric DDoS attacks represent a typical mean of disrupting online services. The impact of such attacks can be vital - let’s consider the impact in critical infrastructure, healthcare, banking or transport. The first line of defence can be applied in network infrastructure by telco operators. Such a defence is capable of stopping or minimizing the impact on end-users or services. Among the wide range of anti-DDoS techniques, this article selects and describes  typical ones and discusses their deployment.
DSM | page 30




About DSM - peer-reviewed magazine

DSM (Data Security Management) magazine was established in the second half of 1997 to create a professional-level periodical magazine, which would bring high quality and up-to date information on the status and development in the area of information security. It publishes theoretical works, the results of research activities and practical applications, reviews and consultations. Top experts participate in creation of DSM, which guarantees a high quality of the contents.

Editorial Policies...

dsm about en

Get a subscription

  • Digital DSM Quarterly Magazine (Czech language ONLY)
  • Easy-to-download PDF format
  • Anytime, anywhere access for the subscribed content
  • Annual subscription or subscribe specific issues
  • Student discount - 15%
  • Bank transfer payment


Annual subscription

year price
4 issues (latest + 3 upcoming)

Special price

One Issue

one price
One issue - latest or previous

See the back issues for DSM and all topics

  • DSM 2017/3 09-Oct-2017

    Main topic: Identity, identification, authentication

  • DSM 2017/2 28-Mar-2017

    Main topic: Intelligent Network and security

  • DSM 2017/1 28-Mar-2017

    Main topic: Malware, adware, spyware, ransomware, allware … virus protection (principles, technology,...

  • DSM 2016/4 08-Dec-2016

    Main Topic: Internet of Things

  • DSM 2016/3 27-Sep-2016

    Main topic: eIDAS

  • DSM 2016/2 30-Jun-2016

    Main topic: Protection of personal data

  • DSM 2016/1 14-Apr-2016

    Main topic: Cyber security

Contact us

TATE International s.r.o.
Hořejší nábřeží 21
150 00 Praha 5

phone  Phone: +420 257 920 319
mobile  Mobil: +420 737 215 219
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Back to top