Normy
 |
ISO/IEC FDIS 27011
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Zdroj: ISO
|
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Zdroj: ISO
Informačná bezpečnosť, kybernetická bezpečnosť a ochrana súkromia. Systémy manažérstva informačnej bezpečnosti. Požiadavky
Zdroj: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Zdroj: ISO
Information technology — Security techniques — Information security management systems — Guidance
Zdroj: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Zdroj: ISO
|
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Zdroj: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Zdroj: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Zdroj: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Zdroj: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Zdroj: ISO
|
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Zdroj: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... více...
Zdroj: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Zdroj: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Zdroj: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Zdroj: ISO
|
|
• Průzkum • Počáteční přístup • Spuštění • Přístup k pověřením a eskalace privilegií • Boční pohyb • Sběr a exfiltrace • Instalace ransomwaru a po... více...
Zdroj: it.portal
jsou informace v databázi, které nelze, nebo by neměly být vymazány nebo upraveny.
Zdroj: it.portal
zobrazit všechny
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... více...
zobrazit všechny
Vytvárajte heslá, ktoré majú aspoň 15 znakov a obsahujú kombináciu veľkých a malých písmen, číslic a symbolov, ak to aplikácia umožňuje.
Zdroj: KCCKB
používam HTTPS, takže moja stránka je bezpečná
Zdroj: it-portal.sk
zobrazit všechny
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Zdroj: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Zdroj: ISO
zobrazit všechny
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... více...
zobrazit odkaz
 Certifikace
|
0 |
 Akreditace
|
0 |
Kontaktujte nás e-mailem
|