What is what in IT
 |
SIEM functionalities
• Collection of data and events • Data normalization • Correlation • Log management • Monitoring of users and applications • Audit reporting
Source: it-portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
show all
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
Vytvárajte heslá, ktoré majú aspoň 15 znakov a obsahujú kombináciu veľkých a malých písmen, číslic a symbolov, ak to aplikácia umožňuje.
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
National Office for Cyber and Information Security show link
show all
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|