Table of Contents
Inhoud: Module 3A - Begrippen en definities................................................................................................ 6
Privacy: definities, perspectieven en taxonomieën................................................................................... 6
Definities............................................................................................................................................... 6
Taxonomieën........................................................................................................................................ 7
Privacy-by-design...................................................................................................................................... 8
Privacytechnologie (privacy engineering).................................................................................................. 9
Het "beveiligingstechnologie"-perspectief (security engineering).......................................................10
Het “gegevensbescherming”-perspectief (data protection)................................................................10
Het “sociale privacy”-perspectief (social privacy)................................................................................10
Inhoud: Module 3A - Uitdagingen voor online privacy................................................................................11
Metadata en verkeersanalyse................................................................................................................. 11
Wat zijn metadata?............................................................................................................................. 11
Het belang van metadata.................................................................................................................... 11
Not “just metadata”............................................................................................................................ 12
Online Tracking....................................................................................................................................... 12
Online tracking: wie, wat en waarom?................................................................................................ 12
Door wie worden we getrackt?.................................................................................................12
Welke gegevens worden er zoal verzameld?............................................................................13
Waarom worden al deze gegevens verzameld?.......................................................................13
Online tracking: hoe verloopt dit technisch?....................................................................................... 13
Websites...................................................................................................................................13
Een website bezoeken..........................................................................................................13
De opbouw van een website.................................................................................................14
Trackers....................................................................................................................................14
Cookies en cookie-syncing........................................................................................................15
Third party cookies...............................................................................................................15
Cookie syncing......................................................................................................................16
Supercookies............................................................................................................................16
Flash-cookies........................................................................................................................16
ETags.....................................................................................................................................17
Evercookies...........................................................................................................................17
Apparaat- en browservingerafdrukken (device & browser fingerprinting)...............................18
Wat is een browser/apparaatvingerafdruk?.........................................................................18
Canvas-fingerprinting (en andere methoden).......................................................................19
1
, Waarom is tracking problematisch?.................................................................................................... 19
Wat kun je doen tegen tracking?........................................................................................................ 20
Privé-browsermethoden...........................................................................................................20
Plug-ins.....................................................................................................................................20
DNT (Do‐Not‐Track)..................................................................................................................20
Het gebruik van een VPN..........................................................................................................20
Tor Browser..............................................................................................................................21
Wat zegt de wet over cookies en tracking?......................................................................................... 22
Vooraf.......................................................................................................................................22
Inhoud: Module 3A - Anonimiseren van databanken en differentiële privacy.............................................25
Inleiding: anonimiseren versus pseudonimisere.....................................................................................25
Hoe veilig zijn ‘geanonimiseerde’ datasets?............................................................................................ 26
Anonimiseringtechnieken....................................................................................................................... 28
Randomisatie...................................................................................................................................... 29
Ruistoevoeging.........................................................................................................................29
Privacywaarborgen...............................................................................................................29
Tekortkomingen....................................................................................................................29
Permutatie................................................................................................................................30
Privacywaarborgen...............................................................................................................30
Tekortkomingen....................................................................................................................30
Differentiële privacy.................................................................................................................31
Privacywaarborgen...............................................................................................................32
Tekortkomingen....................................................................................................................32
Generalisatie....................................................................................................................................... 33
Aggregatie en k-anonimiteit.....................................................................................................33
Privacywaarborgen...............................................................................................................34
Tekortkomingen....................................................................................................................34
Finale bemerking..................................................................................................................35
L-diversiteit en t-gelijkenis........................................................................................................35
Pseudonimiseringtechnieken.................................................................................................................. 36
Privacywaarborgen............................................................................................................................. 36
Vaak gemaakte fouten........................................................................................................................ 37
Afsluitende beschouwing........................................................................................................................ 38
Inhoud: Module 3B - Inleiding tot cybersecurity.........................................................................................39
De evolutie van ‘cyberspace’................................................................................................................... 39
Cybersecurity incidenten (illustraties)..................................................................................................... 40
Malware.............................................................................................................................................. 40
Wat is een virus?.......................................................................................................................40
2
, Een bijzonder soort virussen: cryptolocker-virussen (ransomware).........................................40
Wat is een worm?.....................................................................................................................41
Wat is een Trojaans Paard?......................................................................................................41
Wat is een hoax?......................................................................................................................42
Spyware, keyloggers en browserkapers.............................................................................................. 42
Is spyware gevaarlijk?...............................................................................................................42
Wat zijn keyloggers?.................................................................................................................42
Wat zijn browserkapers?..........................................................................................................43
Defacements....................................................................................................................................... 43
Soorten defacements...............................................................................................................43
Gevolgen van een defacement.................................................................................................43
Jailbreaking / rooting.......................................................................................................................... 44
Datalekken.......................................................................................................................................... 44
Internetfraude (online scams)............................................................................................................. 45
Phishing....................................................................................................................................45
Catfishing..................................................................................................................................45
Wat zijn de onderliggende oorzaken van cybersecurity-incidenten?......................................................46
De mens.............................................................................................................................................. 46
De software......................................................................................................................................... 46
Inhoud: Module 3B - Basisconcepten van computerbeveiliging..................................................................47
Wat is computerbeveiliging.................................................................................................................... 47
Vereisten inzake computerbeveiliging.................................................................................................... 48
Doelstellingen of eigenschappen van computerbeveiliging.....................................................................48
Vooraf: stappen in de computerbeveiligingsanalyse...........................................................................48
De CIA- of BIV-indeling........................................................................................................................ 49
Van beveiligingsdoelstellingen tot beveiligingsbeleid..........................................................................50
Beveiligingsinbreuken (en -dreigingen)................................................................................................... 51
Enkele kernbegrippen......................................................................................................................... 51
Risico- of dreigingsmodellering (threat modeling)..............................................................................52
Tot slot: risicobeheer versus risicobeperking...................................................................................... 53
Inhoud: Module 4A - Blockchain: what's in a name....................................................................................54
Hoe kan ik een blockchain spotten in het wild?......................................................................................54
Voordelen en eigenschappen van een blockchain................................................................................... 54
Uitdagingen voor blockchain................................................................................................................... 55
Types blockchain..................................................................................................................................... 56
Gecentraliseerde databank v. gedecentraliseerde blockchain?..............................................................58
Conclusie................................................................................................................................................. 58
Inhoud: Module 4A - Bouwstenen van de blockchaintechnologie...............................................................58
3
, Concept van een blockchain................................................................................................................... 58
Hashfuncties........................................................................................................................................... 58
Merkle boom.......................................................................................................................................... 60
Timestamping......................................................................................................................................... 60
Digitale handtekeningen......................................................................................................................... 60
Conclusie................................................................................................................................................. 61
Inhoud: Module 4A - Blockchain focus: Bitcoin (BTC) en Ethereum (ETH)...................................................62
Digitaal geld en zijn uitdagingen............................................................................................................. 62
Intermezzo: Digitaal, virtueel en/of elektronisch geld.............................................................................62
Ontstaan en doel van Bitcoin (BTC)......................................................................................................... 62
Werking van Bitcoin................................................................................................................................ 63
Bitcoin als blockchain.......................................................................................................................... 63
Proof-of-work-systeem....................................................................................................................... 63
Mining en geldbeheer......................................................................................................................... 64
Beveiliging tegen fraude...................................................................................................................... 65
Samengevat........................................................................................................................................ 65
Uitdagingen voor Bitcoin......................................................................................................................... 65
Prijsvolatiliteit en het geldprobleem................................................................................................... 65
Pseudonimiteit en geen anonimiteit................................................................................................... 66
Beveiliging is maar zo groot als de bescherming van je private sleutel................................................66
Mining, rekenmacht en het klimaat.................................................................................................... 67
In de schaduw van Bitcoin: Ethereum..................................................................................................... 68
Toepassingsgebied van AVG en haar beperkingen..................................................................................69
Persoonsgegevens............................................................................................................................... 69
Verwerkingsverantwoordelijke........................................................................................................... 70
Huishoudexceptie............................................................................................................................... 70
AVG Rechten en Principes....................................................................................................................... 71
Blockchain als een kans voor de AVG...................................................................................................... 72
Conclusie: AVG en blockchain, water en vuur?.......................................................................................72
Inhoud: Module 4B - Blockchain focus: Smart Contracts............................................................................. 72
Wat is een smart contract?..................................................................................................................... 72
Voor- en nadelen van een smart contract............................................................................................... 72
Hoe maak je smart contracts?................................................................................................................. 73
Smart contracts in de praktijk................................................................................................................. 74
Juridische uitdagingen............................................................................................................................ 74
Totstandkoming contract.................................................................................................................... 74
Interpretatie en uitleg van een smart contract...................................................................................75
Relativiteit en tegenstelbaarheid........................................................................................................ 75
4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MasterKULstudent. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $20.01. You're not tied to anything after your purchase.