Norms
 |
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
|
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
|
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
|
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
|
|
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... viac...
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... viac...
show all
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
show all
Zákon o elektronických komunikáciách show link
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
show all
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|