100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Samenvatting ICT-Management (Deel Kordel)

Rating
-
Sold
4
Pages
198
Uploaded on
04-08-2023
Written in
2022/2023

Samenvatting van het theoretische deel van het vak ICT-Management. Gegeven door Meneer Kordel. Zeer nuttig bij de theoretische uitwerking van het verplichte groepswerk.

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
August 4, 2023
Number of pages
198
Written in
2022/2023
Type
Summary

Subjects

Content preview

1



Contents
Les 1: INLEIDING TOT ICT GOVERNANCE ...................................................................................... 5
systeemniveau ......................................................................................................................... 5
op organisatieniveau ................................................................................................................ 8
Wat zegt (ICT) governance?....................................................................................................... 9
ICT governance opbouw.......................................................................................................... 15
ICT governance focus areas ..................................................................................................... 18
Wie heeft het voor het zeggen ................................................................................................ 21
INLEIDING TOT COBIT ............................................................................................................. 22
Noodzaak aan ICT governance................................................................................................. 24
controles ................................................................................................................................ 27
Cobit (Control OBjectives for Information and related Technology) .......................................... 29
COBIT principle: Separating Governance from Management .................................................... 32
Les 2: inleiding tot data ......................................................................................................................... 40
EEN INTUÏTIEVE BENADERING VAN DATA ......................................................................................... 40
EEN THEORETISCHE BENADERING VAN DATA................................................................................... 42
Inleiding tot de DIKW hiërarchie ................................................................................................... 42
VEEL DATA ......................................................................................................................................... 45
International System of Units (SI ................................................................................................... 45
Namen van grote getallen ............................................................................................................. 47
Valse vrienden in de naamgeving van grote getallen ................................................................... 48
(SPECIALE) SOORTEN DATA ............................................................................................................... 49
Datawarehouse vs database ......................................................................................................... 50
OLTP vs OLAP ................................................................................................................................. 51
Soorten personal data: .................................................................................................................. 51
Dataficatie ..................................................................................................................................... 52
Big data .......................................................................................................................................... 52
Speciale soorten data – Metadata .................................................................................................... 54
Speciale soorten data – Efemere data .............................................................................................. 55
Speciale soorten data – Valse digitale data....................................................................................... 55
Speciale soorten data – Fotomanipulatie – Hoe manipulatie ontdekken? ....................................... 56
Speciale soorten data – Metadata .................................................................................................... 57
Speciale soorten data / Ambient data............................................................................................... 58
File slack ........................................................................................................................................ 59
Swap files ....................................................................................................................................... 61

1

, 2


JURIDISCH VERANTWOORD OMGAAN MET DATA – PRIVACY .......................................................... 61
Principes van privacy ......................................................................................................................... 63
Principes van privacy - Bijzondere persoonsgegevens ...................................................................... 64
Principes van privacy ......................................................................................................................... 68
Data classificatie ................................................................................................................................ 70
Data classificatie – Strikt vertrouwelijk ......................................................................................... 70
Data classificatie - Vertrouwelijk .................................................................................................. 71
Niet vertrouwelijk .......................................................................................................................... 71
Bijzondere persoonsgegevens ....................................................................................................... 72
Gewone persoonsgegevens .......................................................................................................... 72
Data classificatie ................................................................................................................................ 73
GDPR General Data Protection Regulation ...................................................................................... 74
Les 3 : Cryptografie ..................................................................................................................... 78
Inleiding ................................................................................................................................. 79
Definities cryptografie ............................................................................................................ 80
Categorieën van cryptografische methoden ............................................................................ 81
Basisdiensten van cryptografie ................................................................................................ 83
Stap 2: Hoe kunnen we digitaal iets vergrendelen en identificeren? ......................................... 84
Hashfuncties in een sleuteloze wereld ..................................................................................... 84
Kenmerken ............................................................................................................................. 85
Voorbeelden .......................................................................................................................... 86
Aanvullende cryptografische concepten voor hashfuncties ...................................................... 87
Hashing doeleinden: vergelijken van gegevens ........................................................................ 91
Hashing doeleinden detecteren van veranderingen in gegevens .............................................. 97
Hashing doeleinden hash referenties (gaat over de plaats waar hash opgeslagen is) ................ 98
Hashing doeleinde gegevens opslaan op een wijzigingsgevoelige manier ................................. 98
Hashing doeleinden hashfunctie als tool hashpuzzels .............................................................101
Uitdaging...............................................................................................................................105
Symmetrische cryptografie ....................................................................................................107
Asymmetrische cryptografie ..................................................................................................108
Gebruik van crytografie .........................................................................................................110
Data confidentialiteit geheimhouding exclusiviteit .................................................................110
Data integriteit ......................................................................................................................111
Data authenticiteit asymmetrisch ..........................................................................................113
Combinatie data confidentialiteit en data integriteit ..............................................................114
Les 4 .........................................................................................................................................116

2

, 3


Digitale handtekening ............................................................................................................116
Basisversie ............................................................................................................................118
Basisversie potentieel probleem ............................................................................................119
Basisversie met exclusiviteit van de klaartekst .......................................................................120
Digitale certificaten als echtheidsbewijs .................................................................................122
Basisbegrippen certificaat ......................................................................................................123
Inhoud van een digitaal certificaat .........................................................................................124
Roor certificate store RCS ......................................................................................................124
Digitale certificaten op uw EID ...............................................................................................125
Soorten webserver digitale certificaten ..................................................................................126
Domain Validation certificaten ...........................................................................................126
Organisation Validation certificaten ...................................................................................126
Extended Validation certificaten.........................................................................................127
Certificaat verificatie kleuren .................................................................................................128
Certificaat fouten ..................................................................................................................128
Certificaatfouten revoked ......................................................................................................129
Public Key Insfrastructure (PKI) ..............................................................................................130
Hoe wordt pki gebruikt ..........................................................................................................132
PKI sterke en'zwakke punten .................................................................................................133
PKI architecturen ...................................................................................................................134
Certificate chain – chain of trust .............................................................................................134
Hoe een fake website identificeren ........................................................................................137
Controle van digitale certificaten Uitdaging ............................................................................140
Certificate Transparency(CT) ..................................................................................................141
Controle van digitale certificaten ...........................................................................................144
Een Merkle Consistency Proof (MCP) ......................................................................................145
Merkle Audit Proof (MAP)......................................................................................................147
Les 5 blockchain technologie.............................................................................................................. 151
Centralised versus Distributed ........................................................................................................ 155
Voordelen ........................................................................................................................................ 155
Nadelen ........................................................................................................................................... 156
Peer to Peer (P2P) systems ............................................................................................................. 157
Trust and integrity in purely distributed P2P systems .................................................................... 159
Double spending Problem of distributed P2P systems of ledgers ................................................ 160
A ledger as a foundation of ownership ........................................................................................... 161
Ownership and the blockchain ........................................................................................................ 162

3

, 4


How the blockchain works .............................................................................................................. 162
Task 1: Describing ownership .......................................................................................................... 163
Task 2: Protecting ownership .......................................................................................................... 165
Task 3: Storing transaction data ...................................................................................................... 167
Task 4: Preparing ledgers to be distributed in an untrustworthy environment ............................. 172
Task 5: Distributing the ledgers ....................................................................................................... 176
Task 6: Adding new transactions to the ledgers ............................................................................. 177
Task 7: Deciding which ledgers represent the truth ....................................................................... 181
WHAT IS THE BLOCKCHAIN? ............................................................................................................ 184
SMART CONTRACTS – Blockchain 2.0.............................................................................................. 188
Smart contracts benefits ................................................................................................................. 190
Smart contracts and Oracles ........................................................................................................... 190
Smart contracts Ethereum ............................................................................................................. 191
BUSINESS IMPACT OF THE BLOCKCHAIN ......................................................................................... 193
Business use of the blockchain – Proof of existence....................................................................... 194
Business use of the blockchain – Proof of nonexistence ................................................................ 194
Business use of the blockchain – Proof of time .............................................................................. 194
Business use of the blockchain – Proof of order ............................................................................. 194
Business use of the blockchain – Proof of authorship .................................................................... 195
Business use of the blockchain – Proof of ownership ..................................................................... 195
Business impact of the blockchain – Actual usage .......................................................................... 196
Major accomplishments of the blockchain ..................................................................................... 196




4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
HWSamenvatting Katholieke Universiteit Leuven
Follow You need to be logged in order to follow users or courses
Sold
86
Member since
3 year
Number of followers
48
Documents
16
Last sold
1 week ago

2.6

7 reviews

5
2
4
1
3
0
2
0
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions