What is what in IT
 |
IS risk analysis
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks • Assess the impact on operations • Assess the real probability of a security failure • Estimate the level of risks • Determine the acceptability of risks or their management according to established criteria
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
is malicious software that includes all kinds of the most well-known forms, such as Trojan horses, ransomware, viruses, worms, etc.
show all
 Interesting
|
22 |
we have a Firewall so I am safe from attacks
Source: it-portal.sk
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
Zákon o elektronických komunikáciách show link
Vyhláška Národného bezpečnostného úradu, ktorou sa mení a dopĺňa vyhláška Národného bezpečnostného úradu č. 453/2007 Z. z. o administratívnej bezpečnosti show link
show all
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
To ale neznamená, že sú jediné
Source: Uptime Institute
Source: TEST prenosu na LOCAL
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|