SECURITY
Samenvatting
Ambachtelijke samenvatter
21-12-2020
, Inhoud
Informatiebeveiliging .................................................................................................. 2
BIV ............................................................................................................................. 3
Beschikbaarheid ..................................................................................................... 3
Integriteit ................................................................................................................. 3
Vertrouwelijkheid .................................................................................................... 4
Netwerkaanvallen ................................................................................................... 4
Toegangscontrole ................................................................................................... 4
Risicoanalyse ............................................................................................................. 5
Kwantitatieve risicoanalyse ..................................................................................... 5
Berekenen van schade ........................................................................................... 6
Kwalitatieve risicoanalyse ....................................................................................... 6
Risicomaatregelen .................................................................................................. 6
Encryptie .................................................................................................................... 7
Symmetrische encryptie ......................................................................................... 7
Asymmetrische encryptie ........................................................................................ 7
Symmetrisch VS asymmetrisch .............................................................................. 8
Hashes ................................................................................................................... 8
Ciphers ................................................................................................................... 8
Bedreigingen .......................................................................................................... 9
Certificaten ............................................................................................................. 9
Netwerken ................................................................................................................ 10
ICT recht .................................................................................................................. 11
1