skip to main content
10.1145/3551504.3551554acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceeegovConference Proceedingsconference-collections
research-article

Information Security Management System Standards in Hungarian Public Administration

Authors Info & Claims
Published:25 October 2022Publication History

ABSTRACT

Public administrative bodies play a key role in governmental level data asset management. A centralized regulation and toolset of these bodies is a strategic goal, but the experience of the implementation confirms that a meticulous and careful task must be faced. The diversity of the administrative bodies works against a quick change. The study aims to review the information protection obligations of Hungarian public administration bodies, emphasizing the importance of standard-based legal regulation and the centralizing and unifying nature of public administration IT developments. In addition to the historical and legal review, the authors also pay attention to the description of the standard application experience. The goal is to establish a comprehensive and effective regulatory system that may be available through the management system standards, especially the ISO 27000 standard family. It can be concluded that beyond the regulatory intentions in a diverse infrastructure, targeted training and more emphasis on promoting the acceptance of information security is necessary for success.

References

  1. International Standardization Organization. 2018. Information technology — Security techniques — Information security management systems — Overview and vocabulary (ISO/IEC 27000:2018)Google ScholarGoogle Scholar
  2. Márton Gellén, 2020. Motivation and Professionalisation in Hungarian Civil Service: An Empirical Analysis on Hungarian Regional Civil Service. Polgári Szemle 16, 460-472. DOI: 10.24307/psz.2020.1230Google ScholarGoogle ScholarCross RefCross Ref
  3. Tovább folytatódott a minisztériumok informatikai háttérrendszerének egységesítése. Bitport, 2020.12.28. Available at: Tovább folytatódott a minisztériumok informatikai háttérrendszerének egységesítése.https://bitport.hu/tovabb-folytatodott-a-miniszteriumok-informatikai-hatterrendszerenek-egysegesitese. Bitport, 2020.12.28. [Accessed: 11.03.2022.]Google ScholarGoogle Scholar
  4. Government Decision on the coordination of the development of the IT infrastructure of the central governmental bodies, 1039/1993. (V. 21.)Google ScholarGoogle Scholar
  5. Miniszterelnöki Hivatal Informatikai Koordinációs Iroda. 1994. Informatikai biztonsági módszertani kézikönyv. Informatikai Tárcaközi Bizottság ajánlásai – 8. sz. ajánlás. Budapest, Hungary. Available at: http://docplayer.hu/4783087-Informatikai-biztonsagi-modszertani-kezikonyv.html. [Accessed: 11.03.2022.]Google ScholarGoogle Scholar
  6. Miniszterelnöki Hivatal Informatikai Koordinációs Iroda. 1996. Informatikai rendszerek biztonsági követelményei. Informatikai Tárcaközi Bizottság ajánlásai – 12. sz. ajánlás, Budapest, Hungary. Available at: https://dsd.sztaki.hu/mockups/itb/ajanlasok/a12/index.html. [Accessed: 11.03.2022.]Google ScholarGoogle Scholar
  7. Közigazgatási Informatikai Bizottság. 2008. Magyar Informatika Biztonsági Ajánlások (MIBA) 25. számú ajánlássorozat. Budapest, Hungary. Available at: https://regi.ugyintezes.magyarorszag.hu/dokumentumok/kib25miba.pdf. [Accessed: 11.03.2022.]Google ScholarGoogle Scholar
  8. Common Criteria for Information Technology Security Evaluation. CCMB-2017-04-001. Available at: https://www.commoncriteriaportal.org/cc/ [Accessed: 01.07.2022.]Google ScholarGoogle Scholar
  9. Nemzeti Kibervédelmi Intézet. 2019. Közigazgatási Kibervédelmi Eszköztár. NKI White Paper. Budapest, Hungary. Available at: https://nki.gov.hu/wp-content/uploads/2019/03/NKI_White_Paper.pdf. [Accessed: 11.03.2022.]Google ScholarGoogle Scholar
  10. Act on electronic public services, LX Act of 2009Google ScholarGoogle Scholar
  11. Government Decree on the security of electronic public services, 223/2009. (X. 14.)Google ScholarGoogle Scholar
  12. Act on the information security of state and municipal bodies, L Act of 2013Google ScholarGoogle Scholar
  13. Decree of the Minister of Interior on the requirements relating to the technological security and secure information devices and products, and on the security classification and declaration of security levels determined in the Act L of 2013 on the information security of state and municipal bodies, 41/2015. (VII. 15.)Google ScholarGoogle Scholar
  14. Security and Privacy Controls for Federal Information Systems and Organizations. NIST Special Publication 800-53 Rev.4 National Institute of Standards and Technology U.S. Department of Commerce. DOI: 10.6028/NIST.SP.800-53r4Google ScholarGoogle ScholarCross RefCross Ref
  15. Justification for L Act of 2013 on the information security of state and municipal bodiesGoogle ScholarGoogle Scholar
  16. Attila P. Bodó, Tanás Joó, and Tamás Palicz. 2020. Az Ibtv. gyakorlata. Éves továbbképzés az elektronikus információs rendszerek védelméért felelős vezető számára 2020. Nemzeti Közszolgálati Egyetem Közigazgatási Továbbképzési Intézet. Budapest, Hungary.Google ScholarGoogle Scholar
  17. Péter Balatoni, and János Varga. 2019. Információbiztonság és adatvédelem a gyakorlatban – egy országos felmérés és jegyzői interjúk tapasztalatai. Új Magyar Közigazgatás 12, 1, 84-87.Google ScholarGoogle Scholar
  18. István Szabó. 2015. A 2013. évi L. törvény végrehajtási rendelete alapján folytatott biztonsági tanúsítások tapasztalatai a szolgáltatók széles körének vizsgálata után. Hétpecsét Egyesület LXVIII. Szakmai Fórum, 2015. november 18., Budapest, Hunagry. Available at: https://hetpecset.hu/site/uploads/files/7peloadasszabo-inyomtatasrahonla.pdf. [Accessed: 11.03.2022.]Google ScholarGoogle Scholar
  19. Government Decree on the Governmental Data Repository for the security of data related to electronic administration, 466/2017. (XII. 28.)Google ScholarGoogle Scholar
  20. Act on the right to informational self-determination and on the freedom of information, CXII Act of 2011Google ScholarGoogle Scholar
  21. Decree of the Minister of Interior on the requirements for records management software applicable to public service bodies, 3/2018. (II. 21.)Google ScholarGoogle Scholar
  22. Directive (EU) of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, 2016/1148 EU DirectiveGoogle ScholarGoogle Scholar
  23. Government Decree on centralized IT and electronic communications services, 309/2011. (XII. 23.)Google ScholarGoogle Scholar
  24. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148 Brussels, 16.12.2020 COM(2020) 823 final 2020/0359 (COD)Google ScholarGoogle Scholar
  25. Act on the general rules for electronic administration and trust services, CCXXII Act of 2015Google ScholarGoogle Scholar
  26. Decree of the Minister of National Development on organizations using centralized IT and electronic communications services through an individual service agreement and on IT systems operated or developed by the central service provider, 7/2013 (II. 26.)Google ScholarGoogle Scholar
  27. Government Decree on government networks, 346/2010. (XII. 28.)Google ScholarGoogle Scholar
  28. Government Decree on the provision of data processing of state registers belonging to the national data assets, 38/2011. (III. 22.)Google ScholarGoogle Scholar
  29. Government Decree on the operation of the Government Data Center, 467/2017. (XII. 28.)Google ScholarGoogle Scholar
  30. Government Decree on the Unified State Application Development Environment and the State Application Catalog, as well as on the amendment of certain related government decrees, 314/2018. (XII. 27.)Google ScholarGoogle Scholar
  31. Government Decree on the responsibilities of the centralized IT and electronic communications service provider in relation to information security, 186/2015. (VII. 13.)Google ScholarGoogle Scholar
  32. Zoltán Kovács, Zoltán Mikó, and Gábor Sági. 2018. A biztonság mint szolgáltatás megteremtésének lehetőségei az állami, önkormányzati elektronikus információs rendszerek esetében I. Belügyi Szemle 66, 4, 30-42.Google ScholarGoogle ScholarCross RefCross Ref
  33. Zoltán Kovács, Zoltán Mikó, and Gábor Sági. 2018. A biztonság mint szolgáltatás megteremtésének lehetőségei az állami, önkormányzati elektronikus információs rendszerek esetében II. Belügyi Szemle 66, 5, 40-61.Google ScholarGoogle ScholarCross RefCross Ref
  34. Masuda Yoneji. 1988. Az információs társadalom mint posztindusztriális társadalom. OMIKK. Budapest, HungaryGoogle ScholarGoogle Scholar
  35. Government Decree on the municipal ASP system, 257/2016. (VIII. 31.)Google ScholarGoogle Scholar
  36. Tamás Szádeczky. 2013. Az IT biztonság szabályozásának konfliktusa. Inforkommunikáció és Jog 10, 56, 149-153.Google ScholarGoogle Scholar

Index Terms

  1. Information Security Management System Standards in Hungarian Public Administration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CEEeGov '22: Proceedings of the Central and Eastern European eDem and eGov Days
      September 2022
      192 pages
      ISBN:9781450397667
      DOI:10.1145/3551504

      Copyright © 2022 ACM

      © 2022 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format