SOS :: Security Operation Space
club
меню
club
поиск
 
Издатель документа:
Тип документа:
Тематика:
Год публикации с:
Год публикации по:
05.04.2019 г.
pdf

Growth of Public Vulnerability Disclosures, the Important Intermediary. Between Commercial Threat Analysis and Cyber Grid Threat Reporting

Издатель: Other
04.04.2019 г.
pdf

Mapping of existing standards against requirements on security and privacy in the area of IoT

Издатель: ENISA (Греция)
04.04.2019 г.
pdf

2018 is a difficult year to summarize for Infosec. After the initial flurry of activity around Spectre and Meltdown in the beginning of January, we ended the year with global supply chain concerns brought about by the Super Micro story. Throughout the year we saw the geopolitical dilemmas of 2018 manifest in cyber security issues. Technology giants like Facebook and Google had a security reckoning. However in pure scariness the medical data breaches of MyHeritage (DNA) and MyFitnessPal (health) rank higher. The Starwood Marriot Hotel breach made every travelling executive nervous for the rest of the year, but probably not as nervous as the incident of CEO Fraud at Pathé...

Издатель: Other
04.04.2019 г.
pdf

The Internet of Things (IoT) is a rapidly evolving and expanding collection of diverse technologies that interact with the physical world. Many organizations are not necessarily aware of the large number of IoT devices they are already using and how IoT devices may affect cybersecurity and privacy risks differently than conventional information technology (IT) devices do. The purpose of this publication is to help federal agencies and other organizations better understand and manage the cybersecurity and privacy risks associated with their IoT devices throughout their lifecycles...

Издатель: NIST (США)
04.04.2019 г.
pdf

As more devices in the home connect to the internet, the cyber security of the Internet of Things (IoT) is becoming a growing concern. People entrust their personal data to an increasing number of online devices and services. Products and appliances that have traditionally been offline are now becoming connected and need to be designed to withstand cyber threats...

Издатель: ETSI (Франция)
17.03.2019 г.
docx

This document explains the coding structure used by the Federal Government to identify positions that require the performance of information technology, cybersecurity, or other cyber-related functions

Издатель: Other
23.12.2018 г.
pdf

IT Audit Strategies to Maximize Value of Penetration Testing

Издатель: Other
29.11.2018 г.
pdf

This Framework is a resource to help critical infrastructure owners and operators, as well as other private sector, Federal, and S tate, local, tribal, and territorial (SLTT) government partners that share threat information, learn where they can turn, and in what circumstances, to both receive and report threat information.

Издатель: Other
07.11.2018 г.
pdf

Автор: ІГОР БОНДАРЕНКО, заступник директора Департаменту інформаційних технологій МВС України

Издатель: Other
02.10.2018 г.
pdf

Аналітичний дайджест покликаний надати інформацію з питань кібербезпеки, що є надзвичайно актуальними в контексті розвитку інформаційного суспільства, зростання кіберзлочинності, використання засобів кібертероризму у гібрідних війнах та необхідності розбудови системи забезпечення кібернетичної безпеки України відповідно до визначених стратегічних напрямків з урахуванням тенденцій розвитку кіберпростору, сучасних викликів та загроз його безпеці.

© 2013—2024 SOS :: Security Operation Space (Пространство Операций Безопасности)  // Обратная связь  | 0.040
Использование любых материалов, размещённых на сайте, разрешается при условии ссылки на sos.net.ua.