SlideShare une entreprise Scribd logo
1  sur  19
A digitális aláírás elterjedésének lehetőségei és korlátai Szerzők: Krasznay Csaba, Szabó Áron Konzulensek: Hamp Gábor, Horányi Özséb
Tartalom ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bevezető ,[object Object],[object Object],[object Object],[object Object]
A digitális aláírás fontossága a világban ,[object Object],[object Object],[object Object],Pénzügyi szféra
A digitális aláírás fontossága a világban ,[object Object],[object Object],Kormányzati szféra
A digitális aláírás fontossága a világban ,[object Object],Magán szféra
A digitális aláírás és a magyar szabályozás ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A digitális aláírás, mint kriptográfiai eljárás ,[object Object],[object Object],[object Object],[object Object]
A digitális aláírás, mint kriptográfiai eljárás ,[object Object],Hálózat Feladó Vevő Névtár levél kódolt lenyomat lenyomat lenyomat
Az általunk készített felmérés és a válaszok kiértékelése
Az általunk készített felmérés és a válaszok kiértékelése ,[object Object],[object Object],[object Object],[object Object]
Az általunk készített felmérés és a válaszok kiértékelése ,[object Object],[object Object]
Az általunk készített felmérés és a válaszok kiértékelése ,[object Object],[object Object]
Az általunk készített felmérés és a válaszok kiértékelése ,[object Object],[object Object]
Az általunk készített felmérés és a válaszok kiértékelése ,[object Object],[object Object]
Az általunk készített felmérés és a válaszok kiértékelése ,[object Object],[object Object],[object Object],[object Object]
A digitális aláírás a felsőoktatásban ,[object Object],+ + = ,[object Object],[object Object],[object Object]
Befejezés - tervek ,[object Object],[object Object],[object Object],[object Object]
Köszönjük figyelmüket, várjuk a kérdéseket! Krasznay Csaba: krasznay@ebizlab.hit.bme.hu Szabó Áron: baron@ebizlab.hit.bme.hu

Contenu connexe

Similaire à The possibilities and limitations of the spreading of digital signature (in Hungarian)

Emoney 2008-11-03
Emoney 2008-11-03Emoney 2008-11-03
Emoney 2008-11-03guesta49349
 
Nagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatása
Nagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatásaNagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatása
Nagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatásaCsilla Baksa-Pataki
 
Marik Péter: Poken
Marik Péter: PokenMarik Péter: Poken
Marik Péter: PokenMeetOFF
 
Digitális kommunikáció
Digitális kommunikációDigitális kommunikáció
Digitális kommunikációJulia Czenner
 
Madar Norbert: Kikért állunk harcba?
Madar Norbert: Kikért állunk harcba?Madar Norbert: Kikért állunk harcba?
Madar Norbert: Kikért állunk harcba?FinTechZone
 

Similaire à The possibilities and limitations of the spreading of digital signature (in Hungarian) (6)

Emoney 2008-11-03
Emoney 2008-11-03Emoney 2008-11-03
Emoney 2008-11-03
 
Nagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatása
Nagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatásaNagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatása
Nagy Attila - Debreceni e-szig közlekedési pilot projekt bemutatása
 
Marik Péter: Poken
Marik Péter: PokenMarik Péter: Poken
Marik Péter: Poken
 
JK_prezi_IA
JK_prezi_IAJK_prezi_IA
JK_prezi_IA
 
Digitális kommunikáció
Digitális kommunikációDigitális kommunikáció
Digitális kommunikáció
 
Madar Norbert: Kikért állunk harcba?
Madar Norbert: Kikért állunk harcba?Madar Norbert: Kikért állunk harcba?
Madar Norbert: Kikért állunk harcba?
 

Plus de Csaba Krasznay

Security analysis of the Hungarian e-government system (in Hungarian)
Security analysis of the Hungarian e-government system (in Hungarian)Security analysis of the Hungarian e-government system (in Hungarian)
Security analysis of the Hungarian e-government system (in Hungarian)Csaba Krasznay
 
Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)Csaba Krasznay
 
Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Csaba Krasznay
 
Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Csaba Krasznay
 
Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Csaba Krasznay
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Csaba Krasznay
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)Csaba Krasznay
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Csaba Krasznay
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Csaba Krasznay
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Csaba Krasznay
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznayCsaba Krasznay
 
Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Csaba Krasznay
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Csaba Krasznay
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Csaba Krasznay
 
On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)Csaba Krasznay
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Csaba Krasznay
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Csaba Krasznay
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Csaba Krasznay
 
Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Csaba Krasznay
 
Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Csaba Krasznay
 

Plus de Csaba Krasznay (20)

Security analysis of the Hungarian e-government system (in Hungarian)
Security analysis of the Hungarian e-government system (in Hungarian)Security analysis of the Hungarian e-government system (in Hungarian)
Security analysis of the Hungarian e-government system (in Hungarian)
 
Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)
 
Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)
 
Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)
 
Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznay
 
Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)
 
On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary
 
Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)
 
Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Wireless network security (in Hungarian)
Wireless network security (in Hungarian)
 

The possibilities and limitations of the spreading of digital signature (in Hungarian)

  • 1. A digitális aláírás elterjedésének lehetőségei és korlátai Szerzők: Krasznay Csaba, Szabó Áron Konzulensek: Hamp Gábor, Horányi Özséb
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Az általunk készített felmérés és a válaszok kiértékelése
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Köszönjük figyelmüket, várjuk a kérdéseket! Krasznay Csaba: krasznay@ebizlab.hit.bme.hu Szabó Áron: baron@ebizlab.hit.bme.hu