Norms
 |
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is the provision of a service for publishing a web page or web application
is a system of measures to protect classified information from unauthorized persons and from unauthorized manipulation in objects and protected spaces.
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
National Office for Cyber and Information Security show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|