Norms
 |
ISO/IEC 27000:2018
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... viac...
Source: it.portal
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
show all
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
show all
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
Cybersecurity and Infrastructure Security Agency show link
show all
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
show all
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|