Norms
|
ISO/IEC FDIS 27011
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
|
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
|
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
|
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
|
|
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
SMS messages or e-mails that promise price discounts, profit, or any other financial benefits are of course tempting. However, you must not run into them.
Source: KCCKB
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
National Office for Cyber and Information Security show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
Certifications
|
0 |
Acreditations
|
0 |
Contact us by e-mail
|