Legislative
 |
231/2022 Coll.
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov
Source: Časová verzia predpisu účinná od 30.06.2022
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
show all
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... viac...
Source: CheckPoint Research
show all
we have a Firewall so I am safe from attacks
Source: it-portal.sk
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Source: it.portal
show all
Zákon o elektronických komunikáciách show link
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
show all
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|