What is what in IT
 |
Životný cyklus škodlivého útoku
• Prieskum • Chobocina2 • Počiatočný prístup • Spustenie • Prístup k povereniam a eskalácia privilégií • Bočný pohyb • Zber a exfiltrácia • Inštalácia ransomvéru a požadovanie výplaty výkupného
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
should be applied to all digital resources, including identities, endpoints, networks, data, applications and infrastructure. Zero-trust architecture is a complex strateg... viac...
Source: it.portal
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
show all
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|