dsm 1997 2017


DATA SECURITY MANAGEMENT

The prestigious peer-reviewed scholarly magazine on information systems security, administration and risk management


ISSN 1211-8737
ISSN 2336-6745 (online)

info
About magazine
What's DSM, editorial board, peer review policy.
Let's Start...

archiv
DSM Archive
See the back issues for DSM

Check Archive...

ucet
My subscription
DSM subscriber section

READ DSM...

The current issue

2016 4 PC
Main topic:
 Digital footprint, behavioral analysis, blackout, ...

YEAR: 2019  |  ISSUE: 2  |  PUBLISHED: 17.6.2019

 

 

rr These articles were subject to peer-to-peer review.

Click on headline to see more about article

Interview with Jaroslav Jakubček rr

Adam Lamser
Jaroslav Jakubček works in European Cybercrime Centre within the Europol as the only representative from both Czech Republic and Slovakia. We interviewed him regarding the nature of his job as well as the issues he is currently coping with.
DSM | page 6

How do users think about security in the context of mobile banking? rr

Petr Doležal, Agáta Dařbujanová, Lenka Knapová
The article focuses on security from user perspective. The theoretical introduction outlines the concept of mental models and the importance of their exploration for the development of secure systems. The practical part presents the results of a user study of authentication methods in mobile banking.
DSM | page 11

Security of mobile health technologies (mHealth) rr

Zdeněk Gütter
The use of mobile health applications (mHealth) – by both professionals and patients – is associated with many safety issues. The article describes how different types of security affect the efficiency, reliability, credibility and quality of mobile applications in practice. At the same time, it aims to stimulate discussion among security experts in the Czech Republic on the phenomenon of mobile applications, whose comprehensive questions do not yet have a universal solution in the EU countries with the common market.
DSM | page 16

Blackout - Energy companies are preparing to minimize the consequences rr

Pavel Veselka
In the case of a Blackout people will appreciate any help and information. The author describes the experience from the joint exercise of the electricity distributor and the regional offices. He emphasizes the importance of quick transmission of a qualified situation report, cooperation and communication among the people and the affected institutions. The energy business is trying to help by activating local electricity sources.
DSM | page 22

Blockchain and security rr

Jakub Jedlinský
The paper deals with the issue of security of distributed ledger technologies (DLT), focusing on the blockchain. In the first part, it assesses the not well studied topic, namely the role of trust in these DLTs. It does so from a broader systemic perspective. DLTs are referred to as a trustless solution, which is misleading, at best. The second part is devoted to the issue of new security challenges that users themselves have to deal with.
DSM | page 25

Utilizing artificial intelligence in IT security rr

Michal Hebeda
The autor describes the development and real use of artificial intelligence in practice in the field of IT security. In particular, he deals with the broader use of machine learning and its phases, and also defines areas in which artificial intelligence can help to improve safety.
DSM | page 30

How to deal with risks – Part III. rr

Richard Michálek
Another part of the series called “How to deal with risks” brings the specifics of information security risk analysis and management, as well as a practical approach for implementation and tips on reducing workload and improving comprehensibility.
DSM | page 33

Case study: the implementation of DLP in Česká průmyslová zdravotní pojišťovna rr

Matej Zachar
This case study discusses the implementation of Data Loss Prevention (DLP) system in a real environment. Giving an example of Česká průmyslová zdravotní pojišťovna (Czech industrial health insurance company), the article presents specific steps of the implementation project; from an initial analysis to the user acceptance phase. Apart from the architecture of the solution, the focus is laid also on the specific concept and policies used for the implementation to the company’s internal environment.
DSM | page 38

DevOps – Part IV. rr

Vladimír Kufner
This article summarizes the best practices in the area of DevOps implementation, points out the most usual mistakes and things to be avoided. It describes specific DevOps requirements and recommendations such as organizational structures, processes and roles.
DSM | page 42

Holistic approach to cyber security rr

Miroslav Nečas
Cyber security can no longer be viewed just as an ICT issue. Instead, it must be approached holistically. This means perceiving cyber security in the context of fulfilling the organisation’s mission and maintaining its competitiveness, requiring a strengthening interdisciplinary communication within the company and the ability to link information from the ICT infrastructure with information from other internal and external sources. This can be efficiently implemented using a platform that consolidates information from SIEM systems, competitive intelligence, production systems, asset management systems and other information sources.
DSM | page 48

 

VIEW ALL TOPICS FROM THIS ISSUE...

About DSM - peer-reviewed magazine

DSM (Data Security Management) magazine was established in the second half of 1997 to create a professional-level periodical magazine, which would bring high quality and up-to date information on the status and development in the area of information security. It publishes theoretical works, the results of research activities and practical applications, reviews and consultations. Top experts participate in creation of DSM, which guarantees a high quality of the contents.

Editorial Policies...


dsm about en

Get a subscription

  • Pritned and Digital DSM Quarterly Magazine (Czech language ONLY)
  • Easy-to-download PDF format
  • Anytime, anywhere access for the subscribed content
  • Annual subscription or subscribe specific issues
  • Student discount - 15%
  • Bank transfer payment

Subscribe...

Printed + digital subscription

price2189
4 issues

Digital subscription only

price1936
4 issues

See the back issues for DSM and all topics

  • DSM 2019/1 13-Dec-2018

    Main topic: Artificial intelligence, data centers,...

  • DSM 2017/4 09-Oct-2017

    Main topic: Endpoint device security (IoT)

  • DSM 2017/3 09-Oct-2017

    Main topic: Identity, identification, authentication

  • DSM 2017/2 28-Mar-2017

    Main topic: Intelligent Network and security

  • DSM 2017/1 28-Mar-2017

    Main topic: Malware, adware, spyware, ransomware, allware … virus protection (principles, technology,...

  • DSM 2016/4 08-Dec-2016

    Main Topic: Internet of Things

  • DSM 2016/3 27-Sep-2016

    Main topic: eIDAS

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 
Back to top