What is what in IT
 |
HUB
a common connection point for devices on a network to connect local LAN segments
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers more...
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a system of measures related to the selection, designation and control of persons who may become familiar with classified information to a specified extent.
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... more...
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... more...
show all
 Recomendations
|
377 |
Implement cloud or external backup
Source: it.portal
Implement regular reports and risk assessment
Source: it.portal
show all
 Institutions
|
51 |
Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) show link
European Telecommunications Standards Institute show link
show all
 Legislative
|
82 |
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 4 ods. 1 a 2 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 328/02 show link
Source: Eur-Lex
REGULATION (EU) 2021/887 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 20 May 2021 establishing the European Cybersecurity Industrial, Technology and Research Competen... more...
show link
Source: Eur-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|