Marek Zanker, Vladimír Bureš, Anna Cierniak-Emerych, Martin Nehéz
Individuals and corporations alike are aware of the need for data protection. They undergo training and perform exercises where various types data-jeopardizing techniques or cyberattacks are simulated in order to increase the resilience of society and preparedness for crisis situations (National Cyber and Information Security Agency, 2019a). With the help of the General Data Protection Regulation (GDPR), the European Commission (EC) seeks to draw a line between the personal data security and the free and uncontrolled manipulation of personal data (IT Governance Privacy Team, 2020). Since its advent, the GDPR has put burden on the shoulders of various institutions which have been struggling to share data. Not surprisingly, it brought a flareup of frustration (Bovenberg et al., 2020). The intension was good, as the GDPR would ensure and balance the fragile relationship between the data protection and other regulations, such as competition law, consumer protection or intellectual property (De Hert et al., 2018).
Jan Čapek, Miloslav Hub
The ubiquitous Internet connectivity has led to the introduction of an ever-increasing list of diverse online services ranging from financial transactions to online gaming and the other e-commerce purposes. For example, with cloud computing on the rise, geographically distant employees of organizations are able to access and share sensitive organizational resources online. The mentioned trend has increased the amount of user authentication processes. The aim of authentication is to decide whether a subject in question is in fact the subject that he claims to be. As an example can be mentioned traditional authentication, when end users authenticate themselves on computers by using the pair of username and password. In the past, many sophisticated authentication methods were developed. Generally, they can by divided to the three basic types of authentication depending on what kind of identification feature is used: authentication by knowledge, authentication by ownership of something, and authentication by biometrics. Each of these ways has its advantages and disadvantages.