What is what in IT
![none](https://it-portal.sk//images/hint.jpg) |
HUB
a common connection point for devices on a network to connect local LAN segments
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
|
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers viac...
|
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
is a space that is intended for the continuous operation of computer servers, systems and data storage.
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
|
|
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
je pokus o podvodné získanie citlivých informácií, ako sú heslá, údaje o kreditných kartách, vydávaním sa za dôveryhodnú osobu alebo inštitúciu pri elektronickej komuniká... viac...
show all
Google v utorok oznámil vydanie prehliadača Chrome 120 s opravami 10-tich zraniteľností.
06. 12. 2023
show all
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
SMS messages or e-mails that promise price discounts, profit, or any other financial benefits are of course tempting. However, you must not run into them.
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
Zákon o elektronických komunikáciách show link
show all
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
![none](../images/dropdown-white.png) Certifications
|
0 |
![none](../images/dropdown-white.png) Acreditations
|
0 |
Contact us by e-mail
|