Uneingeschränkter Zugang

A Risk Assessment of the Hungarian Eid Card


Zitieren

Act CLXVI of 2012 on the identification, designation and protection of essential systems and facilities. (2012). Hungary Legislation. Search in Google Scholar

European Economic and Social Committee. (2020). The digital single market - trends and opportunities for SMEs (own-initiative opinion). Available at: https://www.eesc.europa.eu/en/our-work/opinions-information-reports/opinions/digital-single-market-trends-and-opportunities-smes-own-initiative-opinion, accessed on December 12, 2023. Search in Google Scholar

Farkas, T. (2023). A kommunikációs és információs rendszerek értelmezése napjainkban: Követelmények és kihívások. In Tóth, András (Ed) Új típusú kihívások az infokommunikációban (pp. 11-30). Budapest, Magyarország: Ludovika Egyetemi Kiadó. Search in Google Scholar

Government decree no. 414/2015. (XII. 23.) on the rules for the issuance of personal identification cards (01 01, 2022). Available at: https://njt.hu/jogszabaly/2015-414-20-22, accessed on December 12, 2023. Search in Google Scholar

Hungarian IT Security Framework (MIBIK). In Hungarian (2008). Search in Google Scholar

Hungarian Ministry of Interior. (2023, 01 01). Role-Based Certification Central Platform Service. In Hungarian. Available at: https://szeusz.gov.hu/szeusz/SZTSZ, accessed on December 11, 2023. Search in Google Scholar

Hungarian Ministry of Interior. (n.d.). eSzemélyi - Services. Available at: https://eszemelyi.hu/en/services/, accessed on December 14, 2023. Search in Google Scholar

Hungarian Ministry of Interior. (n.d.). eSzemélyi - WHY IS AN eID CARD USEFUL? Available at: https://eszemelyi.hu/en/the-eid-card/#why-is-an-eid-card-useful, accessed on December 12, 2023. Search in Google Scholar

Idomsoft Zrt. (n.d.). Electronic Identification Document (eszemélyi). In Hungarian. Available at: https://idomsoft.hu/rolunk/termekeink/eszemelyi/, accessed on December 12, 2023. Search in Google Scholar

ISO. (n.d.). iso.org. Available at: www.iso.org, accessed on January 02, 2023. Search in Google Scholar

ISO/IEC 27001:2022 (2022). Search in Google Scholar

ISO/IEC 27005:2022 (2022). Search in Google Scholar

Jide Edu, M.H. (2023). Exploring the Risks and Challenges of National Electronic Identity (NeID) System. International Conference on AI and the Digital Economy (CADE 2023), 118-123. Search in Google Scholar

Koller, M. (2023). Smart Devices as Security Aspects of Personal Authentication Interface Technology. In Hungarian. Hadmérnök, Vol. 18, Issue 1, 109-124. Search in Google Scholar

KSH. (2023, 12 21). The average gross salary was HUF 564,400 in October 2023, 14.0% higher than a year earlier. In Hungarian. Available at: https://www.ksh.hu/gyorstajekoztatok/ker/ker2310.html accessed on January 02, 2024. Search in Google Scholar

Leitner, A., & Schaumüller-Bichl, I. (2009). ARiMA - a new approach to implement ISO/IEC 27005. 2nd International Symposium on Logistics and Industrial Informatics, 1-6. Search in Google Scholar

Lentner, G., & Parycek, P. (2016). Electronic identity (eID) and electronic signature (eSig) for eGovernment services – a comparative legal study. Transforming Government People Process and Policy. Search in Google Scholar

Mateus, G.B. (2016, 11). A Reference Risk Register for Information Security According to ISO/IEC 27005. Available at: https://fenix.tecnico.ulisboa.pt/downloadFile/1689244997256215/68217-Thesis.pdf, accesses on December 11, 2023. Search in Google Scholar

Megyeri, L., & Farkas, T. (2017). Risk management, science or swindle? In Hungarian. Hadmérnök, Vol. 12. Issue 3, 198-209. Search in Google Scholar

Mojica Sánchez, I.F., Leal Valero, S.A., & Bareño Gutiérrez, R. (2019). Risks Found in Electronic Payment Cards on Integrated Public Transport System Applying the ISO 27005 Standard. Case Study Sitp D.C Colombia. Congreso Internacional de Innovación y Tendencias en Ingenieria (CONIITI ), 1-6. Search in Google Scholar

NISZ Zrt. (n.d.). Services. In Hungarian. Available at: https://nisz.hu/szolgaltatasaink, accessed on December 12, 2023. Search in Google Scholar

Nyári, N. (2022). The Current State and Possibilities of eSzemélyi and Electronic Signature Technology in Hungary. In Hungarian. Biztonságtudományi Szemle, Vol. 4, Issue 2, 61-73. Search in Google Scholar

OWASP. (n.d.). OWASP Risk Rating Methodology. Available at: https://owasp.org/www-community/OWASP_Risk_Rating_Methodology, accessed on December 11, 2023. Search in Google Scholar

Paráda, I., & Farkas, T. (2020). Reconnaissance and Analysis in the Penetration Test 1 Information Gathering Techniques. Hadmérnök, Vol. 15, Issue 1, 159-182. Search in Google Scholar

Patiño, S., Solís, F., Yoo, S.G., & Arroyo, R. (2018). ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005. International Conference on eDemocracy & eGovernment (ICEDEG), 75-82. Search in Google Scholar

Pernpruner, M., Carbone, R., Silvio, R., & Sciarretta, G. (2020). The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (CODASPY ’20). doi:https://doi.org/10.1145/3374664.3375727. Search in Google Scholar

REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL (07 23, 2014). Search in Google Scholar

Schwalm, S., & Alamillo-Domingo, I. (2021). Self-Sovereign-Identity & eIDAS: a Contradiction? Challenges and Chances of eIDAS 2.0. European Review of Digital Administration & Law - Erdal, Vol. 2, Issue 2, 89-108. Search in Google Scholar

scrive. (n.d.). eIDAS and the Digital Single Market. Available at: https://www.scrive.com/trust-center/eidas-summary/, accessed on January 02, 2024. Search in Google Scholar

Somogyi, T., & Nagy, R. (2022). Cyber Threats and Security Challenges in the Hungarian Financial Sector. Contemporary Military Challenges, Vol. 24, Issue 3, 15-29. Available at: https://doi.org/10.33179/BSV.99.SVI.11.CMC.24.3.1. SP 800-30 revision 1 (2012). Search in Google Scholar

Zwingelberg, H., & Hansen, M. (2011). Privacy Protection Goals and Their Implications for eID Systems. 7th PrimeLife International Summer School (PRIMELIFE), 245-260. Search in Google Scholar