dsm 1997 2017


DATA SECURITY MANAGEMENT

The prestigious peer-reviewed scholarly magazine on information systems security, administration and risk management


ISSN 1211-8737
ISSN 2336-6745 (online)

info
About magazine
What's DSM, editorial board, peer review policy.
Let's Start...

archiv
DSM Archive
See the back issues for DSM

CHECK ARCHIVE...

ucet
My subscription
DSM subscriber section

READ DSM...

The current issue

2017 4 PC
Main topic:
 ...

PUBLISHED: 25.6.2020

rr These articles were subject to peer-to-peer review.

Click on headline to see more about article

Interview with Karel Řehka

Daniela Seigová
Brigadier general Karel Řehka was on the 20th March, 2020 appointed to the position of National Cyber and Information Security Agency (NÚKIB) director. In the first of two parts of the interview he answers questions about his future visions, using his experience from military missions in the new function, managing NÚKIB’s financial resources and much more.

DSM | strana 7

Enhancing the security of PKI with blockchain technology rr

Yehor Safonov
This article discusses a possibility of enhancing the security of the classic Public Key Infrastructure (PKI) model with applying a revolutionary blockchain technology. In the first part, the author focuses on explaining the principles of the classical PKI system based on CA's trustiness and on the Certificate Transparency (CT) solution introduced by Google. The author presents security problems and risks related to mentioned models and outlines possible ways of defense against sophisticated attackers. The second part is focused on blockchain technology and integration with PKI. The text compares existing blockchain PKI models with a focus on the CertLedger solution, which can be successfully applied to enhance the security of PKI.

DSM | strana 11

Challenge called DSAR and what does the request for an access to personal data mean for the administratior – part I.rr

Petra Věžníková
The article deals with the data subject‘s right to access their personal data, and to obtain a copy thereof (according to Art. 15 GDPR). The first part of the article contained in this edition gives an overview of the substantive aspects of the right of access from the perspective of the data controller (content and scope of the right) and provides examples of sanctions imposed for non-compliance with GDPR in handling access requests.

DSM | strana 17

DevOps – part VIII. rr

Vladimír Kufner
This, last article of the whole series about DevOps summarizes previous articles and reflects future possible trends in DevOps. It indicates current status of DevOps, names of companies using DevOps. It recommends the most active companies participating on DevOps transformations. It summarizes DevOps web sites and companies associated.

DSM | strana 21

Slider

Václav Stupka, Jakub Vostoupal
This article deals with the European framework for cybersecurity certification and with the changes this new EU legislation shall bring. It explains what the certification is, how the certification framework is supposed to function, which institutions are responsible for it and finally, it introduces the certification procedure itself.

DSM | strana 25

Penetration testing – part I.rr

Michel Quiroz
Article about the basics of a penetration test, informing the reader about key details of this type of IT security practice. Article covers general approach, process, industry standards, and defines multiple different aspects of a penetration test. Further explanation corrects common misunderstandings about the differences between penetration tests and vulnerability scans/red team exercises. As the first article in a series, it will provide the reader with a foundation on penetration testing to build upon for future articles.

DSM | strana 30

Cyberwar is coming. How does the preparation look from the hackers perspective? rr

Daniel Hejda
If we were on the brink of a cyberwar, how would the preparation look from hacker’s perspective? Find out how do attackers think and what activities precede the attack itself. This article explains why is the preparation phase crucial and why is it accurate to compare attackers to strategists or chess players.

DSM | strana 34

ISO 27701: an alternative to the GDPR certification rr

Petr Šimsa
The article is dedicated to introduction of standard ISO/IEC 27701: Privacy Information Management System. It describes basic differences in contradiction to ISO 27001 and introduces the possible usage of the standard including as alternative to GDPR Certification.

DSM | strana 42

Reponses to questions about a law amendment concerning providing cyber protection for the Czech republic

Currently widely discussed law amendment concerning providing cyber protection for the Czech republic brought into public attention many controversial opinions and some disinformation. Therefore we decided to create five comprehensive questions and send them to several public figures, specialists and experts to give them a fair chance to express their opinion and make a clear statement. This  article offers collected answers.

DSM | strana 46

 

VIEW ALL TOPICS FROM THIS ISSUE...

About DSM - peer-reviewed magazine

DSM (Data Security Management) magazine was established in the second half of 1997 to create a professional-level periodical magazine, which would bring high quality and up-to date information on the status and development in the area of information security. It publishes theoretical works, the results of research activities and practical applications, reviews and consultations. Top experts participate in creation of DSM, which guarantees a high quality of the contents.

Editorial Policies...


dsm about en

Get a subscription

  • Pritned and Digital DSM Quarterly Magazine (Czech language ONLY)
  • Easy-to-download PDF format
  • Anytime, anywhere access for the subscribed content
  • Annual subscription or subscribe specific issues
  • Student discount - 15%
  • Bank transfer payment

Subscribe...

Printed + digital subscription

price2189
4 issues

Digital subscription only

price1936
4 issues

See the back issues for DSM and all topics

  • DSM 2019/1 13-Dec-2018

    Main topic: Artificial intelligence, data centers,...

  • DSM 2017/4 09-Oct-2017

    Main topic: Endpoint device security (IoT)

  • DSM 2017/3 09-Oct-2017

    Main topic: Identity, identification, authentication

  • DSM 2017/2 28-Mar-2017

    Main topic: Intelligent Network and security

  • DSM 2017/1 28-Mar-2017

    Main topic: Malware, adware, spyware, ransomware, allware … virus protection (principles, technology,...

  • DSM 2016/4 08-Dec-2016

    Main Topic: Internet of Things

  • DSM 2016/3 27-Sep-2016

    Main topic: eIDAS

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

 
 

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top