What is what in IT
 |
SIEM functionalities
• Collection of data and events • Data normalization • Correlation • Log management • Monitoring of users and applications • Audit reporting
Source: it-portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... viac...
show all
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
show all
Cybersecurity and Infrastructure Security Agency show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
show all
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|