YEAR: 2017 | ISSUE: 1 | PUBLISHED: 28.3.2017
These articles were subject to peer-to-peer review.
Interview with Jeff Bardin
Jeff is an executive director and chief intelligence officer at the Treadstone71 company. In his previous career, he worked at massive corporations such as General Electric or Lockheed Martin. We’ve asked him about his opinion on information wars, propaganda and misinformation.
DSM | page 6
Interview with Sean S. Costigan
Pavel Krátký, Radim Kolář
Sean S. Costigan is professor at George C. Marshall European Center for Security Studies. He is an expert in addressing new security challenges and he has published all sorts of materials in the area of national security and foresight. His current research and teaching deals with relationships between cybersecurity, criminality and terrorism, which we have discussed.
DSM | page 10
Interview with Andreas Uhl
Andreas Uhl is a professor of computer sciences at Salzburg University. In the domain of biometrics, he focuses on the ques-tions connected with biometric systems robustness and security, especially in the area of fingerprint scanning, iris and vein patterns. During our interview, we focused mainly on questions regarding the practical applications of biometric systems.
DSM | page 14
Interview with Antony Verheijen
Antony Verheijen is a Chief Information Security Officer at Air Traffic Control the Netherlands and is the drivetrain behind projects aimed at improving cybersecurity resilience on the Schiphol Airport. In the interview, he talks about how the LVNL approaches cybersecurity.
DSM | page 17
Security amplification protocols
The article reviews most important security amplification protocols that are suitable for ad-hoc networks of devi-ces with limited resources. We show their usage directly for wireless sensor networks that are part of the broader concept of the internet of things. We discuss and evaluate different designs as well as approaches to secrecy amplification, together with their advantages and disadvantages.
DSM | page 19
Legislative requirements for the functioning and protection of intelligent measurement systems
Václav Stupka, Tomáš Pitner
This article is focused on roll-out of smart meters in electric energy grids. One of the main related issues in pro-tection of information systems and communication infrastructure, which is used to remote access to the smart meters, and security of the data generated and processed by the system. This article discusses current and future legislation that puts requirements on the functionality of intelligent metering systems and which governs the data protection and infrastructure requirements of these systems.
DSM | page 23