none none none none none
none none none none none
This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Enable selected Enable all

IT - SECURITY

What is what in IT

none

Vulnerability test

is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on vulnerabilities after scanning.
Source: it.portal
1 / 2 Next
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
• Catastrophic
• Serious
• Medium
• Minimal
• Negligible
Source: it-portal.sk
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies
• 2 Media
• 1 Location outside
Source: it.portal
• 3 Copies
• 2 Media
• 1 Location outside - Off-site
• 1 Backup without connectivity - Offline
• 0 Error
Source: it.portal
• Business continuity team
• List of basic services
• Criticality factor of basic services
• Action plan to maintain the basic service
• Key customers
viac...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
is a space that is intended for the continuous operation of computer servers, systems and data storage.
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
is the organization's ability to react and recover from an event that negatively affected the company's operations
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
is a document that is the cornerstone of ensuring the continuous operation of infrastructure and applications when a major outage occurs.
is an attack on a server or network that overwhelms the network or server with a huge number of requests and causes the service to be unavailable.
is a risk directly affecting the provision of a service, a main process, a system or an organization. There is a risk of financial loss, damage to property, threat to hea... viac...
Source: it.portal
a call from a spoofed phone number looks like your bank number. The caller introduces himself as an employee of the bank and, under the pretext of checking a suspicious p... viac...
is a set of measures that must be met during the design, implementation and use of buildings
is a service to provide server performance and disk space for customer applications.
Source: it-portal.sk
a common connection point for devices on a network to connect local LAN segments
is carried out by risk analysis and are included in the Catalog of Vulnerabilities
Source: it.portal
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... viac...
• Identify assets and their owners
• Identify threats
• Identify vulnerabilities that threats could exploit
• Identify the probabilities and impacts of risks<... viac...
is a set of policies and procedures for the systematic management of an organization's sensitive data
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... viac...
is malicious software that includes all kinds of the most well-known forms, such as Trojan horses, ransomware, viruses, worms, etc.
• 4 Copies
• 3 Locations
• 2 Off-site locations
Source: it.portal
• Have multiple copies of data - at least 3
• Saving copies of data in geographically different locations
• Have at least one copy immediately available for quick... viac...
Source: it.portal
• Access to local resources when connecting from the intranet.
• Access to resources in the cloud when connecting from the intranet.
• Access to local resources w... viac...
Source: it.portal
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
serves to assess the level of security by simulating situations that would be used by an attacker
sú kontrolovanou formou hackingu, ktorá využíva pokročilé techniky a metódy, pomocou ktorých simuluje postupy kybernetického útočníka pri útoku na systém.
Source: it.portal
is a system of measures related to the selection, designation and control of persons who may become familiar with classified information to a specified extent.
je pokus o podvodné získanie citlivých informácií, ako sú heslá, údaje o kreditných kartách, vydávaním sa za dôveryhodnú osobu alebo inštitúciu pri elektronickej komuniká... viac...
is a system of measures to protect classified information from unauthorized persons and from unauthorized manipulation in objects and protected spaces.
is a type of malware that locks up a computer system, or encrypts the data stored on it, and then demands a ransom to regain access
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
je postup, pomocou ktorého sa zisťuje aká je pravdepodobnosť, že dôjde k nežiadúcej udalosti a aké budú jej dôsledky
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... viac...
• extremely high
• high
• low
• negligible
Source: it.portal
are tools for collecting and continuously evaluating cyber security events
Source: it.portal
• Collection of data and events
• Data normalization
• Correlation
• Log management
• Monitoring of users and applications
• Audit reporting
Source: it-portal
Agreement on the level of services provided
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... viac...
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... viac...
• Survey
• Initial access
• Startup
• Credential access and privilege escalation
• Lateral movement
• Collection and exfiltration
• Installation o... viac...
Source: it.portal
• high
• medium
• low
• very low
Source: it.portal
• AI and machine learning
• Attacks on supply chains and critical infrastructure
• Cyber ​​insurance
• State-sponsored attacks and hacktivism
• Deepfake t... viac...
Source: CheckPoint
• Unsolicited content
• Malicious code
• Obtaining information
• Intrusion attempt
• Penetration
• Unavailability
• Risk of information securityviac...
is a place that can be abused by a threat and cause a negative impact on the organization's assets
Source: it.portal
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... viac...
Source: it.portal
is the provision of a service for publishing a web page or web application
none

What is what in IT

67
none

Legislative

16
none

Norms

25
Contact us by e-mail
Copyright © 2019 - 2025
Cookies | Privacy policy | Terms of use