Warning: Table './science/watchdog' is marked as crashed and should be repaired
query: INSERT INTO watchdog
(uid, type, message, variables, severity, link, location, referer, hostname, timestamp)
VALUES
(0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:7:\"warning\";s:8:\"%message\";s:138:\"realpath(): open_basedir restriction in effect. File(/tmp) is not within the allowed path(s): (/var/www/html/science/science.uni-obuda.hu)\";s:5:\"%file\";s:60:\"/var/www/html/science/science.uni-obuda.hu/includes/file.inc\";s:5:\"%line\";i:200;}', 3, '', 'http://science.uni-obuda.hu/en/node/1880', '', '216.73.216.110', 1751317338) in /var/www/html/science/science.uni-obuda.hu/includes/database.mysql.inc on line 135
Warning: Table './science/watchdog' is marked as crashed and should be repaired
query: INSERT INTO watchdog
(uid, type, message, variables, severity, link, location, referer, hostname, timestamp)
VALUES
(0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:7:\"warning\";s:8:\"%message\";s:138:\"realpath(): open_basedir restriction in effect. File(/tmp) is not within the allowed path(s): (/var/www/html/science/science.uni-obuda.hu)\";s:5:\"%file\";s:60:\"/var/www/html/science/science.uni-obuda.hu/includes/file.inc\";s:5:\"%line\";i:200;}', 3, '', 'http://science.uni-obuda.hu/en/node/1880', '', '216.73.216.110', 1751317338) in /var/www/html/science/science.uni-obuda.hu/includes/database.mysql.inc on line 135
Due to the inadequate mamagement of information security
expectations and various unexpected information technology incidents, small and medium
enterprises that lose data or have to cope with a lack of data over a certain period of time may
lose business commissions or customers. A solution to this problem may be the regulated
administration of information security, which may lower the amount of risks. Enterprises in this
sector generally have not enough human, material and information technology resources to
perform tasks of this sort. The controversy seems to be an irresoluble one; the authors attempt
to provide help to initiate a solution to the issue that remains above the ‘still acceptable’ level.
The paper surveys several professional sources as well as standards, recommendations, and
methodologies applicable in the field. The authors of this paper consciously strive to
differentiate between information technology security and information security.