This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
▪ strong two-factor authentication ▪ electronic signature ▪ safe storage of cryptographic keys ▪ storage of third-party certificates ▪ setting specific security policies ▪ the card/token is a certified qualified means (QSCD) ▪ qualified electronic signature according to eIDAS ▪ qualified electronic seal according to eIDAS and more
• Access to local resources when connecting from the intranet. • Access to resources in the cloud when connecting from the intranet. • Access to local resources w... more...
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... more...
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... more...show link
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1