Norms
 |
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
|
Information technology. Security techniques. Information security management systems. Overview and vocabulary show link
Source: STN
Information security, cybersecurity and privacy protection - Information security management systems — Requirements
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
|
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
|
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Ensure configuration and access rights
Source: it.portal
Develop a risk management plan with prioritization.
Source: it.portal
show all
 Institutions
|
51 |
National Cybersecurity Coordination Centre Unit in the Chancellery of the Prime Minister show link
Úřad pro technickou normalizaci, metrologii a státní zkušebnictví show link
show all
 Legislative
|
82 |
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa vykonávajú niektoré ustanovenia zákona č. 473/2005 Z. z. o poskytovaní služieb v oblasti súkromnej bezpečnost... more...
show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
Source: TEST prenosu na LOCAL
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|