- Informatie
- AI Chat
Was dit document nuttig?
Beveiliging | Informatica
Vak: Wetenschappelijke Lijn 1: methodologie van wetenschappelijk onderzoek (VUB-BIOM-007)
82 Documenten
Studenten deelden 82 documenten in dit vak
Universiteit: Vrije Universiteit Brussel
Was dit document nuttig?
Liying Brion Informatica - HOC 2 1e Ba BMW 2019-2020
Beveiliging en encryptie
1INHOUD
1 Inhoud......................................................................................................................................................1
2 Inleiding....................................................................................................................................................2
3 Wat kan er verkeerd gaan?.......................................................................................................................2
4 Basisdoelen voor computerveiligheid.......................................................................................................4
5 Tools voor computerveiligheid..................................................................................................................4
5.1 Tools voor confidentialiteit...............................................................................................................4
5.1.1 Wachtwoorden.........................................................................................................................4
5.2 Tools voor integriteit.........................................................................................................................5
5.2.1 Back-ups....................................................................................................................................5
5.3 Tools voor beschikbaarheid..............................................................................................................5
6 General Data Protection Regulation – GDPR.............................................................................................6
7 Biometrische identificatie.........................................................................................................................6
8 Security issues in communicatie...............................................................................................................7
9 Cryptografie = kunst van het geheimschrif..............................................................................................8
9.1 Cipher...............................................................................................................................................8
10 Encryptie sleutels.................................................................................................................................9
10.1 Man-in-the-middle attack...............................................................................................................10
10.2 HTTPS SSL exchange – encryptie in de praktijk...............................................................................10
10.3 Encryptie in de praktijk – full drive encryption...............................................................................11
10.4 Encryptie in de praktijk – smartphone............................................................................................11
10.5 Virtual Private Network (VPN)........................................................................................................12
1 | P a g i n a
Studenten bekeken ook
Andere gerelateerde documenten
- EPID Samenvatting - Alle informatie afkomstig uit slides van epidemiologie die door de professor
- Wetenschappelijk-denken-H2
- Biologie sv hfd 1-3 - summary of biology chapter 1-3
- section I: assessing the validity and reliability of diagnostic and screening tests
- section I: ways of expressing prognosis
- section II: assessing oreventive and therapeutic measures: randomized trials