Have a personal or library account? Click to login
A Risk Assessment of the Hungarian Eid Card Cover

A Risk Assessment of the Hungarian Eid Card

By: Norbert Nyári and  András Kerti  
Open Access
|Jun 2024

References

  1. Act CLXVI of 2012 on the identification, designation and protection of essential systems and facilities. (2012). Hungary Legislation.
  2. European Economic and Social Committee. (2020). The digital single market - trends and opportunities for SMEs (own-initiative opinion). Available at: https://www.eesc.europa.eu/en/our-work/opinions-information-reports/opinions/digital-single-market-trends-and-opportunities-smes-own-initiative-opinion, accessed on December 12, 2023.
  3. Farkas, T. (2023). A kommunikációs és információs rendszerek értelmezése napjainkban: Követelmények és kihívások. In Tóth, András (Ed) Új típusú kihívások az infokommunikációban (pp. 11-30). Budapest, Magyarország: Ludovika Egyetemi Kiadó.
  4. Government decree no. 414/2015. (XII. 23.) on the rules for the issuance of personal identification cards (01 01, 2022). Available at: https://njt.hu/jogszabaly/2015-414-20-22, accessed on December 12, 2023.
  5. Hungarian IT Security Framework (MIBIK). In Hungarian (2008).
  6. Hungarian Ministry of Interior. (2023, 01 01). Role-Based Certification Central Platform Service. In Hungarian. Available at: https://szeusz.gov.hu/szeusz/SZTSZ, accessed on December 11, 2023.
  7. Hungarian Ministry of Interior. (n.d.). eSzemélyi - Services. Available at: https://eszemelyi.hu/en/services/, accessed on December 14, 2023.
  8. Hungarian Ministry of Interior. (n.d.). eSzemélyi - WHY IS AN eID CARD USEFUL? Available at: https://eszemelyi.hu/en/the-eid-card/#why-is-an-eid-card-useful, accessed on December 12, 2023.
  9. Idomsoft Zrt. (n.d.). Electronic Identification Document (eszemélyi). In Hungarian. Available at: https://idomsoft.hu/rolunk/termekeink/eszemelyi/, accessed on December 12, 2023.
  10. ISO. (n.d.). iso.org. Available at: www.iso.org, accessed on January 02, 2023.
  11. ISO/IEC 27001:2022 (2022).
  12. ISO/IEC 27005:2022 (2022).
  13. Jide Edu, M.H. (2023). Exploring the Risks and Challenges of National Electronic Identity (NeID) System. International Conference on AI and the Digital Economy (CADE 2023), 118-123.
  14. Koller, M. (2023). Smart Devices as Security Aspects of Personal Authentication Interface Technology. In Hungarian. Hadmérnök, Vol. 18, Issue 1, 109-124.
  15. KSH. (2023, 12 21). The average gross salary was HUF 564,400 in October 2023, 14.0% higher than a year earlier. In Hungarian. Available at: https://www.ksh.hu/gyorstajekoztatok/ker/ker2310.html accessed on January 02, 2024.
  16. Leitner, A., & Schaumüller-Bichl, I. (2009). ARiMA - a new approach to implement ISO/IEC 27005. 2nd International Symposium on Logistics and Industrial Informatics, 1-6.
  17. Lentner, G., & Parycek, P. (2016). Electronic identity (eID) and electronic signature (eSig) for eGovernment services – a comparative legal study. Transforming Government People Process and Policy.
  18. Mateus, G.B. (2016, 11). A Reference Risk Register for Information Security According to ISO/IEC 27005. Available at: https://fenix.tecnico.ulisboa.pt/downloadFile/1689244997256215/68217-Thesis.pdf, accesses on December 11, 2023.
  19. Megyeri, L., & Farkas, T. (2017). Risk management, science or swindle? In Hungarian. Hadmérnök, Vol. 12. Issue 3, 198-209.
  20. Mojica Sánchez, I.F., Leal Valero, S.A., & Bareño Gutiérrez, R. (2019). Risks Found in Electronic Payment Cards on Integrated Public Transport System Applying the ISO 27005 Standard. Case Study Sitp D.C Colombia. Congreso Internacional de Innovación y Tendencias en Ingenieria (CONIITI ), 1-6.
  21. NISZ Zrt. (n.d.). Services. In Hungarian. Available at: https://nisz.hu/szolgaltatasaink, accessed on December 12, 2023.
  22. Nyári, N. (2022). The Current State and Possibilities of eSzemélyi and Electronic Signature Technology in Hungary. In Hungarian. Biztonságtudományi Szemle, Vol. 4, Issue 2, 61-73.
  23. OWASP. (n.d.). OWASP Risk Rating Methodology. Available at: https://owasp.org/www-community/OWASP_Risk_Rating_Methodology, accessed on December 11, 2023.
  24. Paráda, I., & Farkas, T. (2020). Reconnaissance and Analysis in the Penetration Test 1 Information Gathering Techniques. Hadmérnök, Vol. 15, Issue 1, 159-182.
  25. Patiño, S., Solís, F., Yoo, S.G., & Arroyo, R. (2018). ICT Risk Management Methodology Proposal for Governmental Entities Based on ISO/IEC 27005. International Conference on eDemocracy & eGovernment (ICEDEG), 75-82.
  26. Pernpruner, M., Carbone, R., Silvio, R., & Sciarretta, G. (2020). The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (CODASPY ’20). doi:https://doi.org/10.1145/3374664.3375727.
  27. REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL (07 23, 2014).
  28. Schwalm, S., & Alamillo-Domingo, I. (2021). Self-Sovereign-Identity & eIDAS: a Contradiction? Challenges and Chances of eIDAS 2.0. European Review of Digital Administration & Law - Erdal, Vol. 2, Issue 2, 89-108.
  29. scrive. (n.d.). eIDAS and the Digital Single Market. Available at: https://www.scrive.com/trust-center/eidas-summary/, accessed on January 02, 2024.
  30. Somogyi, T., & Nagy, R. (2022). Cyber Threats and Security Challenges in the Hungarian Financial Sector. Contemporary Military Challenges, Vol. 24, Issue 3, 15-29. Available at: https://doi.org/10.33179/BSV.99.SVI.11.CMC.24.3.1. SP 800-30 revision 1 (2012).
  31. Zwingelberg, H., & Hansen, M. (2011). Privacy Protection Goals and Their Implications for eID Systems. 7th PrimeLife International Summer School (PRIMELIFE), 245-260.
DOI: https://doi.org/10.2478/bsaft-2024-0010 | Journal eISSN: 3100-5098 | Journal ISSN: 3100-508X
Language: English
Page range: 91 - 102
Published on: Jun 7, 2024
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2024 Norbert Nyári, András Kerti, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.