100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Summary

Samenvatting Samevatting informatieveiligheid P2

Rating
-
Sold
-
Pages
25
Uploaded on
31-03-2023
Written in
2022/2023

IN dit document is een uitgebreide samenvatting van het boek informatiebeveiliging onder controle en de lessen informatieveiligheid weergegeven. In de samenvatting staan alle begrippen beschreven en er zijn voorbeelden gegeven doormiddel van tekst of plaatjes. De samenvatting is een goede voldoende waard.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Study
Course

Document information

Summarized whole book?
Yes
Uploaded on
March 31, 2023
Number of pages
25
Written in
2022/2023
Type
Summary

Subjects

Content preview

Informatieveiligheid
Naam : Eline de Goede
Klas : 1AC
Datum : 20-02-2023
Toets : Herkansing p2

,Inhoud
................................................................................................................................................................3
Algemeen............................................................................................................................................4
Les 3....................................................................................................................................................4
Les 4....................................................................................................................................................4
Les 5....................................................................................................................................................4
Les 6....................................................................................................................................................4
Les 7....................................................................................................................................................4
Les 3 – informatie in een organisatie en betrouwbaarheid van informatie............................................6
Het belang van gegevens....................................................................................................................6
Soorten informatie systemen.............................................................................................................7
Informatiebeveiliging..........................................................................................................................8
Beschikbaarheid.............................................................................................................................8
Integriteit........................................................................................................................................8
Vertrouwelijkheid...........................................................................................................................8
Incident cyclus....................................................................................................................................8
maatregelen.......................................................................................................................................9
Les 4 – verschijningsvormen van Cybercrime...................................................................................10
Dreigers en hun doelwitten..............................................................................................................10
Dreigers en hun intenties..................................................................................................................11
Vromen van cybercrime anno 2022..................................................................................................11
Malware............................................................................................................................................13
Soorten Malware..........................................................................................................................13
Les 5 – De mens als zwakste schakel.................................................................................................14
Attitude (houding) m.b.t. informatiebeveiliging............................................................................14
Menselijk falen.................................................................................................................................15
Beveiliging tegen menselijk falen..................................................................................................15
Bewustwordingscampagnes.........................................................................................................15
Oorzaken onveilige software.............................................................................................................16
Criminelen maken gebruik van de mens...............................................................................................16
Stap 1: Footprinting......................................................................................................................17
Stap 2: Social engineering.............................................................................................................17
Ontwerpcriteria voor informatie systemen.......................................................................................17
Specificeren van toegang..................................................................................................................18
Verlenen van toegang.......................................................................................................................18

, Bewaken van toegang.......................................................................................................................18
Two-factor authentication................................................................................................................19
Les 7 – Applicatie- en netwerkbeveiliging en cryptografie....................................................................20
Netwerkbeveiliging...........................................................................................................................20
Standaarden internet: TCP/IP protocollen........................................................................................20
Wat is netwerkbeveiliging?...............................................................................................................21
Applicatie beveiliging........................................................................................................................22
Cryptografie......................................................................................................................................24
Het gebruik van cryptografie........................................................................................................24
De bescherming van cryptografie.................................................................................................24
Asymmetrische cryptografie.........................................................................................................25
$8.36
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
degoedeeline

Also available in package deal

Get to know the seller

Seller avatar
degoedeeline Avans Hogeschool
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
1
Documents
7
Last sold
2 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions