This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Legislative
45/2011 Coll.
Zákon o kritickej infraštruktúre
Hide pdf
Show pdf
Previous
2 / 2
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CISA - CYBER INCIDENTS
show link
Report an incident
show link
show all
What is what in IT
67
SLA (Service Level Agreement)
Agreement on the level of services provided
Identification of vulnerabilities
is carried out by risk analysis and are included in the Catalog of Vulnerabilities
Source: it.portal
show all
Interesting
22
92% of malware is distributed via email
Source: Internet
87% increase in IoT malware in 2022 compared to 2021
Source: Internet
show all
Recomendations
23
PROTECT PERSONAL DATA - 03. Delete old conversations
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
PROTECT PERSONAL DATA - 05. Do not share your location
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Institutions
9
GOV CERT SK
A specialized center designed primarily to increase the cyber security of the GOVNET network.
show link
NCKB
National Cyber Security Center
show link
show all
Legislative
16
493/2022 Coll.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti
show link
134/2016 Z. z. - kópia
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
Source: SLEX
show all
Norms
25
ISO/IEC CD 27017
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
ISO/IEC 27001:2022
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
show all
Technologies
14
pfSense
show link
Check Point
show link
show all
Infographics
9
Implemented specialized training in the field of cyber security
Source: Enisa
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
1
MWC Barcelona 2024
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Media
40
Vyčkávanie by nás zničilo
show link
Source: HN špeciál
Ofenzívna bezpečnosť - ťažko na cvičisku, ľah... ľahšie na bojisku
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use