Media
 |
58. Hacking a kybernetická bezpečnost - Burp suite - nastavení a zachycení prvního požadavku
Source: David Šetek - Hackni svou budoucnost
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... more...
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Implement a classification process
Source: it.portal
Ensure agreements on outage support.
Source: it.portal
show all
 Institutions
|
51 |
Nationales Koordinierungszentrum Cybersicherheit (NCC-AT) show link
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe show link
show all
 Legislative
|
82 |
ZÁKON ze dne 20. března 2019 o přístupnosti internetových stránek a mobilních aplikací a o změně zákona č. 365/2000 Sb., o informačních systémech veřejné správy a o změně... more...
show link
Source: e-sbirka
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|