What is what in IT
 |
IS risk analysis
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks • Assess the impact on operations • Assess the real probability of a security failure • Estimate the level of risks • Determine the acceptability of risks or their management according to established criteria
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
is a proactive approach to security across all layers of the digital space where every transaction is continuously verified. It uses the rule of least privilege and relie... viac...
Source: it.portal
• high • medium • low • very low
Source: it.portal
show all
 Interesting
|
22 |
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
 Technologies
|
14 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|