What is what in IT
 |
Fake phone number
a call from a spoofed phone number looks like your bank number. The caller introduces himself as an employee of the bank and, under the pretext of checking a suspicious payment, granting a loan or other fact, tries to lure out sensitive data, e.g. payment card data, login data for electronic banking or codes from SMS messages. The goal of fraudsters is to use these data to transfer money from your account to their own, or to make a purchase on the Internet using the data for your account or card.
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
|
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers viac...
|
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
is a space that is intended for the continuous operation of computer servers, systems and data storage.
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
|
|
 Actual incidents
|
6 |
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... viac...
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
show all
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
show all
 Recomendations
|
23 |
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
show all
 Institutions
|
9 |
 Legislative
|
14 |
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
8 |
Contact us by e-mail
|