Norms
 |
ISO/IEC 27011:2016
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
show all
 Interesting
|
22 |
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... more...
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
show all
 Recomendations
|
377 |
Do a compliance gap analysis
Source: it.portal
Consider their implementation
Source: it.portal
show all
 Institutions
|
51 |
Finnish Transport and Communications Agency Traficom's National Cyber Security Centre (NCSC-FI) show link
Elektronická Sbírka zákonů a mezinárodních smluv show link
show all
 Legislative
|
82 |
Vyhláška o kybernetické bezpečnosti show link
Source: e-sbirka
Zákon o ochrane utajovaných skutočností a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|