Author: Csaba Krasznay


The possibilities and limitations of the spreading of digital signature (in Hungarian)

The possibilities and limitations of the spreading of digital signature (in Hungarian)

In this paper we deal with the subject of digital signature...


Security analysis and development opportunities of Hungarian e-government (in Hungarian)

Security analysis and development opportunities of Hungarian e-government (in Hungarian)

In 2009 and 2010 a huge development is expected in the Hung...


Robot2009 krasznay
General

Briefly about PCI DSS standard (in Hungarian)

Briefly about PCI DSS standard (in Hungarian)

Payment Card Industry (PCI) Data Security Standard (DSS) is...


Security analysis of the Hungarian e-government system (in Hungarian)

Security analysis of the Hungarian e-government system (in Hungarian)

The electronic public administration got a big push with th...


Spam business – The route of unsolicited e-mails from the attacker to the victim (in Hungarian)

Web service threats in e-government environment (in Hungarian)

Web service threats in e-government environment (in Hungarian)

In 2009 and 2010 many software and system developments will...


Authentic long-term archiving with electronic signature (in Hungarian)

Authentic long-term archiving with electronic signature (in Hungarian)

With the modification of the law about Electronic Signature...


Security of the Hungarian electronic government systems (in Hungarian)

Security of the Hungarian electronic government systems (in Hungarian)

The presentation gives a short overview about the security...


Countermeasures on the internet (in Hungarian)

Countermeasures on the internet (in Hungarian)

The goal of this presentation is to provide the meaning and...


Possibilities and results of the usage of electronic signatures in the business (in Hungarian)

Possibilities and results of the usage of electronic signatures in the business (in Hunga...

This presentation discusses understandably the usage of ele...


Possibilities of IT security evaluations based on Common Criteria in Hungary (in Hungarian)

Possibilities of IT security evaluations based on Common Criteria in Hungary (in Hungaria...

The presentation gives some information about Common Criter...


Security of mobile devices (in Hungarian)

Security of mobile devices (in Hungarian)

Another continuation. Based on my previous Hacktivity prese...


The ISO 27000 family (in Hungarian)

The ISO 27000 family (in Hungarian)

Thanks to my friend, Szigeti Szabolcs I'm invited in every...


Development of information systems - Common Criteria (in Hungarian)

Development of information systems - Common Criteria (in Hungarian)

This presentation introduces to the basics of Common Criter...


Evaluation laboratories in the Hungarian Information Security Evaluation and Certification Scheme (in Hungarian)

Evaluation laboratories in the Hungarian Information Security Evaluation and Certificatio...

Hungary has joined the Common Criteria Recognition Agreemen...


Security of handheld computers (in Hungarian)

Security of handheld computers (in Hungarian)

The security of handheld computers is getting more and more...


Phishing and spam in Hungary and worldwide (in Hungarian)

Phishing and spam in Hungary and worldwide (in Hungarian)

In my presentation - following the topic that was begun on...


Hacktivity2009 krasznay
General

Bluetooth security (in Hungarian)

Bluetooth security (in Hungarian)

In my presentation which was held on the Hacktivity 2005 Co...


Information security from the other side: Hackers in Hungary (in Hungarian)

Information security from the other side: Hackers in Hungary (in Hungarian)

I try to introduce the participants of the Hungarian hacker...


On the net night and day - security in the virtual space (in Hungarian)

On the net night and day - security in the virtual space (in Hungarian)

This presentation introduce what I call the philosophy of i...


Testing the system: ethical hacking and penetration testing (in Hungarian)

Testing the system: ethical hacking and penetration testing (in Hungarian)

I wanted to make a presentation about ethical hacking for a...


Hungarian Electronic Public Administration Interoperability Framework (MEKIK) – Technical Standards Catalogue

Developing interoperable e-government solutions in Hungary

Developing interoperable e-government solutions in Hungary

In 2005 we presented the Hungarian Electronic Public Admini...


Rules of digital archiving (in Hungarian)

Rules of digital archiving (in Hungarian)

The presentation deals with the place and problems of digit...


Wireless network security (in Hungarian)

Wireless network security (in Hungarian)

This short presentation - was delivered on the D-Lan LAN Pa...


Development of a secure e-commerce system based on PKI (in Hungarian)

Development of a secure e-commerce system based on PKI (in Hungarian)

The goal of my thesis is the development of an electronic c...


Hackers in the national cyber security

Hackers in the national cyber security

Hackers are used to call bad guys but in reality this is no...