This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
63. Hacking a kybernetická bezpečnost - Burp suite - co je repeater
https://www.youtube.com/watch?v=SYFPbqrwJEU&list=PLQ8x_VWW6AkvEbUHMZ5tS4xqogrkGFhJk
Source: David Šetek - Hackni svou budoucnost
Previous
9 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
Report an incident
show link
CheckPoint Research
show link
show all
What is what in IT
66
Availability
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
Immutable data
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
show all
Interesting
22
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
87% increase in IoT malware in 2022 compared to 2021
Source: Internet
show all
Recomendations
377
Risk Management
Centrally store plans and ensure access to relevant persons.
Source: it.portal
Business continuity (BC/DR)
Implement monitoring and alerting.
Source: it.portal
show all
Institutions
51
NCC-SE
Swedish Civil Contingencies Agency MSB
show link
SK-CERT
National Cyber Security Center
show link
show all
Legislative
82
433/2020 Sb.
VYHLÁŠKA ze dne 23. října 2020 o údajích vedených v katalogu cloud computingu
show link
Source: e-sbirka
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 4 ods. 1 a 2 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 328/02
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 4 ods. 1 a 2 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 328/02
show link
Source: Eur-Lex
show all
Norms
25
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
ISO/IEC CD 27017
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
Technologies
14
CISCO
WireGuard
show link
show all
Infographics
7
10 biggest threats for 2030
Source: ENISA
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
6. Hacking pro začátečníky - co jsou to sítě
show link
Source: David Šetek - Hackni svou budoucnost
34. Hacking pro začátečníky - Co zjistíme z responsu
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use