Media
 |
96. Hacking a kybernetická bezpečnost - Blind SQL injection
Source: David Šetek - Hackni svou budoucnost
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Recommend a combination of methods
Source: it.portal
Develop an IRP (Incident Response Plan)
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o kybernetické bezpečnosti show link
Source: e-sbirka
Zákon o ochrane utajovaných skutočností a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|