GENERAL DATA PROTECTION REGULATION René Magerčiak Abstract Today, personal data protection is one of the most discussed areas of law. The main focus is the GDPR regulation. In the article we present the basic concepts and area of this issue. We will also show some of the main regulations of the GDPR, but we…
Blog
AKO SA EFEKTÍVNE CHRÁNIŤ PRED INTERNETOVÝMI NÁSTRAHAMI
HOW TO EFFECTIVELY PROTECT YOURSELF FROM TRAPS ON THE INTERNET Veronika Gajarská Abstract Nowadays, antivirus protection is not enough, so we must follow certain security principles when visiting the Internet. Antivirus is a type of computer program that is designed to detect and remove computer viruses that have infected your computer. They can also…
BEZPEČNOSŤ MOBILNÝCH ZARIADENÍ
SECURITY OF MOBILE DEVICES Radomír Chovanec Abstract The aim of the article is to assess security threats in the operation of mobile phones. The article describes the most common security threats and suggestions for increasing the level of security of mobile devices. Keywords: smartphone, security Abstrakt Cieľom článku je posúdiť bezpečnostné hrozby pri…
DO COGNITIVE BIASES HAVE AN IMPACT ON CYBER SECURITY?
Daniela Pucicov Abstract With humankind continuously taking faster and deeper steps into the digital era, with devices accompanying both our professional and personal life 24/7, becoming a victim of cyber attacks is becoming more probable every day. This is why cybersecurity is particularly important. It encompasses everything that pertains to protecting our sensitive data,…
STRATÉGIA A SÚLAD S NARIADENÍM GDPR
PERSONAL DATA PROTECTION ACCORDANCE WITH GDPR Orsolya Kürti Abstract The aim of the article is to characterize the use of the GDPR regulation in the European union. The work will deal with the practicl use of the regualtion, ho w i tis implemented by companies and what changes it brings to GDPR users on…
STRATÉGIA PREVENCIE VOČI PRIEMYSELNEJ ŠPIONÁŽI
INDUSTRIAL ESPIONAGE PREVENTION STRATEGY Nikoletta Szegfüová Abstract The aim of the article is to list possible ways of protection against industrial espionage. The work deals with the design of a security policy that defines possible ways of protection against industrial espionage, the characterization of industrial espionage using selected examples. Key words: industrial espionage, security…
COVID-19 A PROBLEMATIKA GDPR
COVID-19 AND GDPR PROBLEMS Peter Jelenčík Abstract The aim of the article is to present the issue of GDPR during the COVID-19 pandemic, which in some way significantly interferes with the legal basis of the GDPR Regulation.. Key words: GDPR, COVID-19 Abstrakt Cieľom článku je predstaviť problematiku GDPR počas pandémie COVID-19, ktorá zasahuje…
KYBERNETICKÁ BEZPEČNOSŤ
CYBER SECURITY Dominik Lučan Abstract The article deals with cyber security, basic concepts in the field of cyber security, a description of recommendations on how to combat cyber attacks and recommendations for using a personal computer and choosing a strong password. Key words: Hacker, security, black hat, white hat, Abstrakt Článok sa zaoberá…
MANAŽMENT BEZPEČNOSTI V SPOJITOSTI S COVID-19
SAFETY MANAGEMENT IN CONNECTION WITH COVID-19 Peter Jelenčík Abstract The article focuses on the description of security issues in connection with the currently prevailing pandemic situation. The aim of the article is to acquaint readers with the basic concepts of safety management and to point out the importance of safety in the spread of…
WHATSAPP ALEBO SIGNAL ?
WHATSAPP OR SIGNAL ? Filip Schulz Abstract The aim of this article is to clarify the WhatsApp and Signal applications. The basis of the article is to point out the security of the given applications for the user himself as well as his basic functions and information. Key words: WhatsApp, Signal, user Abstrakt Cieľom…