This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
So training or incident?
https://hnonline.sk/hn-special/kyberneticka-bezpecnost/96202842-je-uzitocne-odhalit-slabe-miesta-skor-nez-to-urobia-utocnici-a-regulator
Source: HN špeciál
Previous
10 / 20
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
SK-CERT Safety warnings
show link
show all
What is what in IT
66
Data center
is a space that is intended for the continuous operation of computer servers, systems and data storage.
SLA (Service Level Agreement)
Agreement on the level of services provided
show all
Interesting
22
92% of malware is distributed via email
Source: Internet
79% of organizations have a security gap
Source: Internet
show all
Recomendations
23
Secure digital identity of the employee using the card and its options
▪ strong two-factor authentication
▪ electronic signature
▪ safe storage of cryptographic keys
▪ storage of third-party certificates
▪ setting specific se...
viac...
Source: it.portal
Security is also current operational documentation
show all
Institutions
9
WORD-LEX
Legal and information portal
show link
SK-CERT
National Cyber Security Center
show link
show all
Legislative
14
492/2022 Coll.
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti
show link
493/2022 Coll.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti
show link
show all
Norms
25
ISO/IEC 27006:2015
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
Technologies
14
OpenVPN
show link
pfSense
show link
show all
Infographics
7
10 biggest threats for 2030
Source: ENISA
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
116
Zdravotníctvo a spolu s ním aj my pod útokom
show link
Source: HN špeciál
We know that. Social engineering builds an attack on these pillars
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use