Infographics
 |
Implemented specialized training in the field of cyber security
Source: Enisa
|
|
To ale neznamená, že sú jediné
Source: Uptime Institute
|
To ale neznamená, že sú jediné
Source: Google Maps
|
|
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
• Access to local resources when connecting from the intranet. • Access to resources in the cloud when connecting from the intranet. • Access to local resources w... viac...
Source: it.portal
show all
Vytvárajte heslá, ktoré majú aspoň 15 znakov a obsahujú kombináciu veľkých a malých písmen, číslic a symbolov, ak to aplikácia umožňuje.
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
National Institute of Standards and Technology show link
show all
Zákon o elektronických komunikáciách show link
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
show all
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|