[
Act CLXVI of 2012 on the identification, designation and protection of essential systems and facilities. (2012). Hungary Legislation.
]Search in Google Scholar
[
European Economic and Social Committee. (2020). The digital single market - trends and opportunities for SMEs (own-initiative opinion). Available at: https://www.eesc.europa.eu/en/our-work/opinions-information-reports/opinions/digital-single-market-trends-and-opportunities-smes-own-initiative-opinion, accessed on December 12, 2023.
]Search in Google Scholar
[
Farkas, T. (2023). A kommunikációs és információs rendszerek értelmezése napjainkban: Követelmények és kihívások. In Tóth, András (Ed) Új típusú kihívások az infokommunikációban (pp. 11-30). Budapest, Magyarország: Ludovika Egyetemi Kiadó.
]Search in Google Scholar
[
Government decree no. 414/2015. (XII. 23.) on the rules for the issuance of personal identification cards (01 01, 2022). Available at: https://njt.hu/jogszabaly/2015-414-20-22, accessed on December 12, 2023.
]Search in Google Scholar
[
Hungarian IT Security Framework (MIBIK). In Hungarian (2008).
]Search in Google Scholar
[
Hungarian Ministry of Interior. (2023, 01 01). Role-Based Certification Central Platform Service. In Hungarian. Available at: https://szeusz.gov.hu/szeusz/SZTSZ, accessed on December 11, 2023.
]Search in Google Scholar
[
Hungarian Ministry of Interior. (n.d.). eSzemélyi - Services. Available at: https://eszemelyi.hu/en/services/, accessed on December 14, 2023.
]Search in Google Scholar
[
Hungarian Ministry of Interior. (n.d.). eSzemélyi - WHY IS AN eID CARD USEFUL? Available at: https://eszemelyi.hu/en/the-eid-card/#why-is-an-eid-card-useful, accessed on December 12, 2023.
]Search in Google Scholar
[
Idomsoft Zrt. (n.d.). Electronic Identification Document (eszemélyi). In Hungarian. Available at: https://idomsoft.hu/rolunk/termekeink/eszemelyi/, accessed on December 12, 2023.
]Search in Google Scholar
[
ISO. (n.d.). iso.org. Available at: www.iso.org, accessed on January 02, 2023.
]Search in Google Scholar
[
ISO/IEC 27001:2022 (2022).
]Search in Google Scholar
[
ISO/IEC 27005:2022 (2022).
]Search in Google Scholar
[
Jide Edu, M.H. (2023). Exploring the Risks and Challenges of National Electronic Identity (NeID) System. International Conference on AI and the Digital Economy (CADE 2023), 118-123.
]Search in Google Scholar
[
Koller, M. (2023). Smart Devices as Security Aspects of Personal Authentication Interface Technology. In Hungarian. Hadmérnök, Vol. 18, Issue 1, 109-124.
]Search in Google Scholar
[
KSH. (2023, 12 21). The average gross salary was HUF 564,400 in October 2023, 14.0% higher than a year earlier. In Hungarian. Available at: https://www.ksh.hu/gyorstajekoztatok/ker/ker2310.html accessed on January 02, 2024.
]Search in Google Scholar
[
Leitner, A., & Schaumüller-Bichl, I. (2009). ARiMA - a new approach to implement ISO/IEC 27005. 2nd International Symposium on Logistics and Industrial Informatics, 1-6.
]Search in Google Scholar
[
Lentner, G., & Parycek, P. (2016). Electronic identity (eID) and electronic signature (eSig) for eGovernment services – a comparative legal study. Transforming Government People Process and Policy.
]Search in Google Scholar
[
Mateus, G.B. (2016, 11). A Reference Risk Register for Information Security According to ISO/IEC 27005. Available at: https://fenix.tecnico.ulisboa.pt/downloadFile/1689244997256215/68217-Thesis.pdf, accesses on December 11, 2023.
]Search in Google Scholar
[
Megyeri, L., & Farkas, T. (2017). Risk management, science or swindle? In Hungarian. Hadmérnök, Vol. 12. Issue 3, 198-209.
]Search in Google Scholar
[
Mojica Sánchez, I.F., Leal Valero, S.A., & Bareño Gutiérrez, R. (2019). Risks Found in Electronic Payment Cards on Integrated Public Transport System Applying the ISO 27005 Standard. Case Study Sitp D.C Colombia. Congreso Internacional de Innovación y Tendencias en Ingenieria (CONIITI ), 1-6.
]Search in Google Scholar
[
NISZ Zrt. (n.d.). Services. In Hungarian. Available at: https://nisz.hu/szolgaltatasaink, accessed on December 12, 2023.
]Search in Google Scholar
[
Nyári, N. (2022). The Current State and Possibilities of eSzemélyi and Electronic Signature Technology in Hungary. In Hungarian. Biztonságtudományi Szemle, Vol. 4, Issue 2, 61-73.
]Search in Google Scholar
[
OWASP. (n.d.). OWASP Risk Rating Methodology. Available at: https://owasp.org/www-community/OWASP_Risk_Rating_Methodology, accessed on December 11, 2023.
]Search in Google Scholar
[
Paráda, I., & Farkas, T. (2020). Reconnaissance and Analysis in the Penetration Test 1 Information Gathering Techniques. Hadmérnök, Vol. 15, Issue 1, 159-182.
]Search in Google Scholar
[
Patiño, S., Solís, F., Yoo, S.G., & Arroyo, R. (2018). ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005. International Conference on eDemocracy & eGovernment (ICEDEG), 75-82.
]Search in Google Scholar
[
Pernpruner, M., Carbone, R., Silvio, R., & Sciarretta, G. (2020). The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (CODASPY ’20). doi:https://doi.org/10.1145/3374664.3375727.
]Search in Google Scholar
[
REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL (07 23, 2014).
]Search in Google Scholar
[
Schwalm, S., & Alamillo-Domingo, I. (2021). Self-Sovereign-Identity & eIDAS: a Contradiction? Challenges and Chances of eIDAS 2.0. European Review of Digital Administration & Law - Erdal, Vol. 2, Issue 2, 89-108.
]Search in Google Scholar
[
scrive. (n.d.). eIDAS and the Digital Single Market. Available at: https://www.scrive.com/trust-center/eidas-summary/, accessed on January 02, 2024.
]Search in Google Scholar
[
Somogyi, T., & Nagy, R. (2022). Cyber Threats and Security Challenges in the Hungarian Financial Sector. Contemporary Military Challenges, Vol. 24, Issue 3, 15-29. Available at: https://doi.org/10.33179/BSV.99.SVI.11.CMC.24.3.1. SP 800-30 revision 1 (2012).
]Search in Google Scholar
[
Zwingelberg, H., & Hansen, M. (2011). Privacy Protection Goals and Their Implications for eID Systems. 7th PrimeLife International Summer School (PRIMELIFE), 245-260.
]Search in Google Scholar