What is what in IT
 |
IS risk analysis
• Identify assets and their owners • Identify threats • Identify vulnerabilities that threats could exploit • Identify the probabilities and impacts of risks • Assess the impact on operations • Assess the real probability of a security failure • Estimate the level of risks • Determine the acceptability of risks or their management according to established criteria
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
• extremely high • high • low • negligible
Source: it.portal
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
show all
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
show all
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
show all
Zákon o elektronických komunikáciách show link
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
show all
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|