Media
 |
30. Hacking a kybernetická bezpečnost - pasivní sběr informací a nslookup
Source: David Šetek - Hackni svou budoucnost
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... more...
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Maintain logs and assessments.
Source: it.portal
Implement decision and access logging
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Vyhláška o některých požadavcích pro zápis do katalogu cloud computingu show link
Source: e-sbirka
Zákon, ktorým sa mení a dopĺňa zákon č. 272/2016 Z. z. o dôveryhodných službách pre elektronické transakcie na vnútornom trhu a o zmene a doplnení niektorých zákonov (zák... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|