Media
 |
29. Hacking a kybernetická bezpečnost - příkaz ping
Source: David Šetek - Hackni svou budoucnost
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
▪ Postal and courier services ▪ Waste management ▪ Manufacturing, production and distribution of chemical agents ▪ Food production, processing and distributio... more...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Create a register and set up a maintenance process
Source: it.portal
Define a malware protection policy.
Source: it.portal
show all
 Institutions
|
51 |
Eyvor, National Coordination Centre for Cybersecurity - The Electronic Communications Office of Iceland (ECOI) show link
National Cybersecurity Coordination Centre Unit in the Chancellery of the Prime Minister show link
show all
 Legislative
|
82 |
Zákon o informačných technológiách vo verejnej správe a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovuje obsah bezpečnostných opatrení, obsah a štruktúra bezpečnostnej dokumentácie a rozsah všeobecných bezpečnostn... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|