What is what in IT
 |
SLA (Service Level Agreement)
Agreement on the level of services provided
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
|
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
|
|
 Actual incidents
|
6 |
is a risk directly affecting the provision of a service, a main process, a system or an organization. There is a risk of financial loss, damage to property, threat to hea... viac...
Source: it.portal
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... viac...
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
 Recomendations
|
23 |
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
show all
 Institutions
|
9 |
Vyhláška Národného bezpečnostného úradu, ktorou sa mení a dopĺňa vyhláška Národného bezpečnostného úradu č. 453/2007 Z. z. o administratívnej bezpečnosti show link
Zákon o elektronických komunikáciách show link
show all
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
9 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|