SlideShare a Scribd company logo
1 of 39
Elektronikus aláírás használatának lehetőségei és hatásai a gazdasági életben Krasznay Csaba BME Informatikai Központ [email_address]
Tartalom ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mi is az elektronikus aláírás? ,[object Object],[object Object]
Mi is az elektronikus aláírás? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mi a lenyomat? ,[object Object],[object Object],[object Object],[object Object]
0011010100100011101000111110
Mi a titkos kulcs? ,[object Object],[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101
Mi az aláírás-létrehozó eszköz? ,[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101
Mi a tanúsítvány? ,[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101
Mi az időbélyegző? ,[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101
Mi a nyilvános kulcs? ,[object Object],[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101 1101101111000011010111011101 0011010100100011101000111110 0011010100100011101000111110
Mi a visszavonási lista? ,[object Object],[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101 1101101111000011010111011101 0011010100100011101000111110 0011010100100011101000111110
Ki az a hitelesítés-szolgáltató? ,[object Object],[object Object]
0011010100100011101000111110 1101101111000011010111011101 1101101111000011010111011101 0011010100100011101000111110 0011010100100011101000111110
Törvényi háttér ,[object Object],[object Object],[object Object]
Törvényi háttér ,[object Object],[object Object]
Hogy is kell ezt érteni? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mindenhol jelenlevő alkalmazások ,[object Object],[object Object],[object Object]
Mindenhol jelenlevő alkalmazások
Mindenhol jelenlevő alkalmazások ,[object Object],[object Object],[object Object]
Mindenhol jelenlevő alkalmazások
Mindenhol jelenlevő alkalmazások ,[object Object],[object Object],[object Object]
Mindenhol jelenlevő alkalmazások
Egyéb lehetőségek ,[object Object],[object Object],[object Object]
Egyéb lehetőségek ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Jelenlegi alkalmazások ,[object Object],[object Object],[object Object],[object Object],[object Object]
Nehézségek ,[object Object],[object Object],[object Object]
Javaslatok a bevezetésre ,[object Object],[object Object],[object Object],[object Object]
Javaslatok a bevezetésre ,[object Object],[object Object],[object Object]
„Hol lehet e-aláírást venni?” ,[object Object],[object Object],[object Object],[object Object],[object Object]
Kit válasszak? ,[object Object],[object Object],[object Object],[object Object]
Hasznos információforrások ,[object Object],[object Object],[object Object],[object Object],[object Object]
Köszönöm a figyelmet!

More Related Content

More from Csaba Krasznay

A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...
A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...
A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...Csaba Krasznay
 
The possibilities and limitations of the spreading of digital signature (in H...
The possibilities and limitations of the spreading of digital signature (in H...The possibilities and limitations of the spreading of digital signature (in H...
The possibilities and limitations of the spreading of digital signature (in H...Csaba Krasznay
 
Security analysis and development opportunities of Hungarian e-government (in...
Security analysis and development opportunities of Hungarian e-government (in...Security analysis and development opportunities of Hungarian e-government (in...
Security analysis and development opportunities of Hungarian e-government (in...Csaba Krasznay
 
Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)Csaba Krasznay
 
Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Csaba Krasznay
 
Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Csaba Krasznay
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Csaba Krasznay
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)Csaba Krasznay
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Csaba Krasznay
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Csaba Krasznay
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Csaba Krasznay
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznayCsaba Krasznay
 
Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Csaba Krasznay
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Csaba Krasznay
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Csaba Krasznay
 
On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)Csaba Krasznay
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Csaba Krasznay
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Csaba Krasznay
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Csaba Krasznay
 

More from Csaba Krasznay (20)

A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...
A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...
A magyar elektronikus közigazgatási szolgáltatások komplex információvédelmi ...
 
Robot2009 krasznay
Robot2009 krasznayRobot2009 krasznay
Robot2009 krasznay
 
The possibilities and limitations of the spreading of digital signature (in H...
The possibilities and limitations of the spreading of digital signature (in H...The possibilities and limitations of the spreading of digital signature (in H...
The possibilities and limitations of the spreading of digital signature (in H...
 
Security analysis and development opportunities of Hungarian e-government (in...
Security analysis and development opportunities of Hungarian e-government (in...Security analysis and development opportunities of Hungarian e-government (in...
Security analysis and development opportunities of Hungarian e-government (in...
 
Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)Authentic long-term archiving with electronic signature (in Hungarian)
Authentic long-term archiving with electronic signature (in Hungarian)
 
Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)
 
Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznay
 
Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)
 
On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)On the net night and day - security in the virtual space (in Hungarian)
On the net night and day - security in the virtual space (in Hungarian)
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary
 

Possibilities and results of the usage of electronic signatures in the business (in Hungarian)