What is what in IT
 |
Social Engineering
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
|
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
|
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
|
|
 Actual incidents
|
6 |
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
 Recomendations
|
23 |
▪ strong two-factor authentication ▪ electronic signature ▪ safe storage of cryptographic keys ▪ storage of third-party certificates ▪ setting specific se... viac...
Source: it.portal
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
Cybersecurity and Infrastructure Security Agency show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Source: SLEX
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
 Technologies
|
14 |
Source: TEST prenosu na LOCAL
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
8 |
Contact us by e-mail
|