دستورالعمل_صدور_کارت_هدیه_و_بن_کارت.pdf
156.2 KB
با حکم رییسجمهور، سازمان #پدافند_غیرعامل کشور عضو جدید شورای عالی فضای مجازی شد.
«ابراهیم رئیسی» رئیسجمهور در اولین جلسه شورای عالی فضای مجازی، رئیس سازمان پدافند غیرعامل کشور را به این شورا اضافه کرد.
دعوت از سردار «غلامرضا جلالی» بر اساس قانون مصوب مجلس در سال ۹۶ درباره عضویت پدافند غیرعامل کشور در ۶ شورای عالی کشور انجام شده است.
👁 @intsec
#خبر
«ابراهیم رئیسی» رئیسجمهور در اولین جلسه شورای عالی فضای مجازی، رئیس سازمان پدافند غیرعامل کشور را به این شورا اضافه کرد.
دعوت از سردار «غلامرضا جلالی» بر اساس قانون مصوب مجلس در سال ۹۶ درباره عضویت پدافند غیرعامل کشور در ۶ شورای عالی کشور انجام شده است.
👁 @intsec
#خبر
لیست ۴۲ #آسیب_پذیری از ۱۸ تکنولوژی که گروههای هکری از آن ها برای initial access استفاده میکنند تا باج افزارهای خود را اجرا کنند.
👁 @intsec
#ransomware
👁 @intsec
#ransomware
#لیست آخرین استانداردهای مرتبط با کلود و رایانش ابری
☑️ ISO/IEC 17203:2017
Information technology — Open Virtualization Format (OVF) specification
☑️ ISO/IEC 17788:2014
Information technology — Cloud computing — Overview and vocabulary
☑️ ISO/IEC 17789:2014
Information technology — Cloud computing — Reference architecture
☑️ ISO/IEC 17826:2016
Information technology — Cloud Data Management Interface (CDMI)
☑️ ISO/IEC 18384-1:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA
☑️ ISO/IEC 18384-2:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions
☑️ ISO/IEC 18384-3:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology
☑️ ISO/IEC 19086-1:2016
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
☑️ ISO/IEC 19086-2:2018
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
☑️ ISO/IEC 19086-3:2017
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
☑️ ISO/IEC 19086-4:2019
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
☑️ ISO/IEC 19941:2017
Information technology — Cloud computing — Interoperability and portability
☑️ ISO/IEC 19944:2017
Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
☑️ ISO/IEC 19944-1:2020
Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals
☑️ ISO/IEC DIS 19944-2
Cloud computing and distributed platforms — Data flow, data categories and data use — Part 2: Guidance on application and extensibility
☑️ ISO/IEC TR 22678:2019
Information technology — Cloud computing — Guidance for policy development
☑️ ISO/IEC TS 23167:2020
Information technology — Cloud computing — Common technologies and techniques
☑️ ISO/IEC TR 23186:2018
Information technology — Cloud computing — Framework of trust for processing of multi-sourced data
☑️ ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
☑️ ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
☑️ ISO/IEC 27036-1:2014
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
☑️ ISO/IEC 27036-2:2014
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
☑️ ISO/IEC 27036-3:2013
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
☑️ ISO/IEC 27036-4:2016
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
☑️ ISO/IEC 27040:2015
Information technology — Security techniques — Storage security
☑️ ISO/IEC TR 30102:2012
Information technology — Distributed Application Platforms and Services (DAPS) — General technical principles of Service Oriented Architecture
👁 @intsec
#Cloud #Standard #ISO #Framework
☑️ ISO/IEC 17203:2017
Information technology — Open Virtualization Format (OVF) specification
☑️ ISO/IEC 17788:2014
Information technology — Cloud computing — Overview and vocabulary
☑️ ISO/IEC 17789:2014
Information technology — Cloud computing — Reference architecture
☑️ ISO/IEC 17826:2016
Information technology — Cloud Data Management Interface (CDMI)
☑️ ISO/IEC 18384-1:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA
☑️ ISO/IEC 18384-2:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 2: Reference Architecture for SOA Solutions
☑️ ISO/IEC 18384-3:2016
Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology
☑️ ISO/IEC 19086-1:2016
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
☑️ ISO/IEC 19086-2:2018
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
☑️ ISO/IEC 19086-3:2017
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
☑️ ISO/IEC 19086-4:2019
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
☑️ ISO/IEC 19941:2017
Information technology — Cloud computing — Interoperability and portability
☑️ ISO/IEC 19944:2017
Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
☑️ ISO/IEC 19944-1:2020
Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals
☑️ ISO/IEC DIS 19944-2
Cloud computing and distributed platforms — Data flow, data categories and data use — Part 2: Guidance on application and extensibility
☑️ ISO/IEC TR 22678:2019
Information technology — Cloud computing — Guidance for policy development
☑️ ISO/IEC TS 23167:2020
Information technology — Cloud computing — Common technologies and techniques
☑️ ISO/IEC TR 23186:2018
Information technology — Cloud computing — Framework of trust for processing of multi-sourced data
☑️ ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
☑️ ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
☑️ ISO/IEC 27036-1:2014
Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and concepts
☑️ ISO/IEC 27036-2:2014
Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
☑️ ISO/IEC 27036-3:2013
Information technology — Security techniques — Information security for supplier relationships — Part 3: Guidelines for information and communication technology supply chain security
☑️ ISO/IEC 27036-4:2016
Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
☑️ ISO/IEC 27040:2015
Information technology — Security techniques — Storage security
☑️ ISO/IEC TR 30102:2012
Information technology — Distributed Application Platforms and Services (DAPS) — General technical principles of Service Oriented Architecture
👁 @intsec
#Cloud #Standard #ISO #Framework
HackerSploit_DockerSecurity.pdf
2 MB
Title: An In-Depth Guide to Mobile Device #Forensics
Year: 2021
Author(s): Chuck Easttom
Publisher: CRC Press
Language: English
Pages: 249
👁 @intsec
#CT #Book
Year: 2021
Author(s): Chuck Easttom
Publisher: CRC Press
Language: English
Pages: 249
👁 @intsec
#CT #Book
D-STR-CYB_GUIDE.01-2018-PDF-E.pdf
950.3 KB
آيين_نامه_پيشـنهادی_نظـارت_پارلمـان_و_شـورای_اروپـا_بـر_رمزدارايی.pdf
1.6 MB
آييننامه پيشنهادی نظارت پارلمان و شـورای اروپا بر رمزدارايیها و اصلاحيه دستورالعمل (EU) 1937/2019 توسط مرکز ملی فضای مجازی ترجمه و منتشر شد.
👁 @intsec
👁 @intsec