What is what in IT
|
Cyber security
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
|
• Prieskum • Chobocina2 • Počiatočný prístup • Spustenie • Prístup k povereniam a eskalácia privilégií • Bočný pohyb • Zber a exfiltrácia • In... viac...
Source: it.portal
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
|
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... viac...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
|
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers viac...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
is a data storage intended for their backup, which is separated from the production environment, which makes the data more securely stored. Before each further data stora... viac...
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
is a space that is intended for the continuous operation of computer servers, systems and data storage.
|
|
▪ Postal and courier services ▪ Waste management ▪ Manufacturing, production and distribution of chemical agents ▪ Food production, processing and distributio... viac...
is an attack on a server or network that overwhelms the network or server with a huge number of requests and causes the service to be unavailable.
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
show all
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
Zákon o elektronických komunikáciách show link
show all
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
Certifications
|
0 |
Acreditations
|
0 |
Contact us by e-mail
|