This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...