What is what in IT
 |
Penetration tests
sú kontrolovanou formou hackingu, ktorá využíva pokročilé techniky a metódy, pomocou ktorých simuluje postupy kybernetického útočníka pri útoku na systém.
Source: it.portal
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers more...
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
▪ Subject - private or public organization ▪ if at the same time ▪ provides at least one service listed in the annexes of the directive and at the same time ▪... more...
• Survey • Initial access • Startup • Credential access and privilege escalation • Lateral movement • Collection and exfiltration • Installation o... more...
Source: it.portal
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... more...
show all
 Recomendations
|
377 |
Implement legal obligations and sanctions.
Source: it.portal
Implement regular assessments and reports.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o kybernetické bezpečnosti show link
Source: e-sbirka
Vykonávacie nariadenie Komisie (EÚ) 2024/2690 zo 17. októbra 2024, ktorým sa stanovujú pravidlá uplatňovania smernice (EÚ) 2022/2555, pokiaľ ide o technické a metodické p... more...
show link
Source: Eur-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... more...
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|