Media
 |
We know that. Social engineering builds an attack on these pillars
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... viac...
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... viac...
show all
Vytvárajte heslá, ktoré majú aspoň 15 znakov a obsahujú kombináciu veľkých a malých písmen, číslic a symbolov, ak to aplikácia umožňuje.
Source: KCCKB
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
show all
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|