none none none none none
none none none none none
This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Enable selected Enable all

IT - SECURITY

What is what in IT

none

Fake phone number

a call from a spoofed phone number looks like your bank number. The caller introduces himself as an employee of the bank and, under the pretext of checking a suspicious payment, granting a loan or other fact, tries to lure out sensitive data, e.g. payment card data, login data for electronic banking or codes from SMS messages. The goal of fraudsters is to use these data to transfer money from your account to their own, or to make a purchase on the Internet using the data for your account or card.
1 / 8 Next
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
• Catastrophic
• Serious
• Medium
• Minimal
• Negligible
Source: it-portal.sk
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies
• 2 Media
• 1 Location outside
Source: it.portal
• 3 Copies
• 2 Media
• 1 Location outside - Off-site
• 1 Backup without connectivity - Offline
• 0 Error
Source: it.portal
none

What is what in IT

67
none

Legislative

16
none

Norms

25
Contact us by e-mail
Copyright © 2019 - 2025
Cookies | Privacy policy | Terms of use