YEAR: 2018 | ISSUE: 3 | PUBLISHED: 28.9.2018
These articles were subject to peer-to-peer review.
Interview with Denis Moreau
In the last issue we talked with Denis Moreau, Senior Engineering Architect at VMware, about cloud, its development and impact on compliance. We will now continue the discussion with talks about possibilities and the future of virtualization, its potential use in new approaches to cyber security and we will tackle the topic of emerging challenges and how to prepare for them.
DSM | page 6
How to deploy cloud services securely – Part III.
Michal Wojnar, Martin Zbořil
The third part of the cloud security serial is a case study describing qualitative risk assessment performed by the financial services company prior to cloud service implementation. In particular, the article includes also the summary of all risks and their evaluation identified during the assessment.
DSM | page 17
Security aspects of Industry 4.0
Industry 4.0 is associated with many optimistic visions. Because of its impact on human society, security is a very important aspect of the realization of visions that we call Industrial 4.0, Company 4.0, Smart City with Smart House and Smart Transport etc. Systems that are part of Industry 4.0 (ICS/SCADA/DCS) are historically more vulnerable than traditional ICT systems. And other visions related to the growing presence of artificial intelligence in these areas will require even greater caution.
DSM | page 22
Slovak Electronic Identity Card (eID) – Part III.
It is the right time for evolution from current eID cards to mobile eIDs, which will significantly increase comfort of the user and overall usage of electronic services. There are various approaches and innovative solutions addressing this topic. Besides fo-llowing its own criteria, governments should take into consideration also requirements of the commercial sector that objectively and timely correlate and thus can lead to synergic effect resulting in prompt adoption. Currently forming trends show that mobile devices have the potential to completely substitute not only eID card, but also other types of identity documents in the future so we can have them always close at hand and which are accepted in the electronic as well as the physical world internationally.
DSM | page 29
Classifications are not the same
The article describes different types of classification relevant to information security. Its main objective is to compare nuances between each classifications and define whether in the given context, information or data classification is an appropriate term.
DSM | page 35
DevOps – Part I.
This article is the first part of the longer series about DevOps phenomena. It summarizes reasons for origin, history, trends, expectations and basic concepts. It compares DevOps with traditional methods of managing IT.
DSM | page 38
Certification of software products for qualified electronic signature and seal in Slovakia
The article is dedicated to the topic of certification of software products for qualified electronic signature and seal, per-forming audit, methodology, legislative requirements and changes that were brought to this area by EU Regulation no. 910/2014 (eIDAS) and Act no. 272/2016 Z. z. about confidential services.
DSM | page 44
„Next-Gen“ antiviruses – Part I..
The first part of the Next-Gen antivirus software series introduces the current state of antivirus software and describes the princi-ples of detection of both common and Next-Gen antivirus software. It also provides information about the features that each current adequate antivirus software should have.
DSM | page 48
Lukáš Antal, Stanislav Klubal
ATMs are basically just computers running on Windows OS with specialized peripheral hardware. This makes them suscep-tible to different attacks, mainly the money jackpotting attack that empties ATM's safe and gives all the money to the attacker. During the past few years, our experts performed numerous penetration tests of ATMs and verified, that none of the tested ATMs was resistant against this attack.
DSM | page 54
Book Review – Cyber Crime
Vladimír Smejkal updated the second edition of the Cyber Crime book, including extraordinary amount of new information and huge number of recent knowledge related to robots and Industry 4.0, for example.
DSM | page 57