This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
63. Hacking a kybernetická bezpečnost - Burp suite - co je repeater
https://www.youtube.com/watch?v=SYFPbqrwJEU&list=PLQ8x_VWW6AkvEbUHMZ5tS4xqogrkGFhJk
Source: David Šetek - Hackni svou budoucnost
Previous
5 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CISA - CYBER INCIDENTS
show link
NÚKIB - Threats and vulnerabilities
show link
show all
What is what in IT
66
Digital footprint
is an electronic trail made up of data and information that every user leaves behind every time they access the Internet
Source: it-portal.sk
SLA (Service Level Agreement)
Agreement on the level of services provided
show all
Interesting
22
79% of organizations have a security gap
Source: Internet
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
show all
Recomendations
377
Incident Management
Implement specific technical and organizational measures.
Source: it.portal
Incident management
Implement an incident severity scale.
Source: it.portal
show all
Institutions
51
ITU
International Telecommunication Union (ITU)
show link
WORD-LEX
Legal and information portal
show link
show all
Legislative
82
95/2019 Z. z.
Zákon o informačných technológiách vo verejnej správe a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
367/2024 Z. z.
Zákon o kritickej infraštruktúre a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27000:2018
Information technology. Security techniques. Information security management systems. Overview and vocabulary
show link
Source: STN
ISO/IEC 27014:2020
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
Technologies
14
pfSense
show link
Supermicro
show link
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
show all
Events
0
Certifications
0
Acreditations
0
Media
436
20. Hacking a kybernetická bezpečnost - co je to root
show link
Source: David Šetek - Hackni svou budoucnost
40. Hacking pro začátečníky - CDN neboli Content Delivery Network
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use