Information Security Awareness Training
Unauthorized access, use, modification, disclosure, elimination, disposition of information as a type of entity [...]
- Elekse Risk Management
Unauthorized access, use, modification, disclosure, elimination, disposition of information as a type of entity [...]
The purpose of Law No. 5549 is to determine the procedures and principles for the prevention of [...]
In accordance with Article 4 of the Law No. 5549 titled "Suspicious transaction notification",any attempt to do so or to be made before [...]
To access data that does not belong to him or her knowledge about computer and communication technologies, [...]
The main purpose of information security training is to ensure the negative effects of the invoice payment organization created by the company [...]
The security of every information in communication and in the magnetic environment is evaluated within the scope of "Cyber Security". [...]