100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Samenvatting ICT-Management (Deel Kordel) $6.14   Add to cart

Summary

Samenvatting ICT-Management (Deel Kordel)

 27 views  0 purchase
  • Course
  • Institution

Samenvatting van het theoretische deel van het vak ICT-Management. Gegeven door Meneer Kordel. Zeer nuttig bij de theoretische uitwerking van het verplichte groepswerk.

Preview 4 out of 198  pages

  • August 4, 2023
  • 198
  • 2022/2023
  • Summary
avatar-seller
1



Contents
Les 1: INLEIDING TOT ICT GOVERNANCE ...................................................................................... 5
systeemniveau ......................................................................................................................... 5
op organisatieniveau ................................................................................................................ 8
Wat zegt (ICT) governance?....................................................................................................... 9
ICT governance opbouw.......................................................................................................... 15
ICT governance focus areas ..................................................................................................... 18
Wie heeft het voor het zeggen ................................................................................................ 21
INLEIDING TOT COBIT ............................................................................................................. 22
Noodzaak aan ICT governance................................................................................................. 24
controles ................................................................................................................................ 27
Cobit (Control OBjectives for Information and related Technology) .......................................... 29
COBIT principle: Separating Governance from Management .................................................... 32
Les 2: inleiding tot data ......................................................................................................................... 40
EEN INTUÏTIEVE BENADERING VAN DATA ......................................................................................... 40
EEN THEORETISCHE BENADERING VAN DATA................................................................................... 42
Inleiding tot de DIKW hiërarchie ................................................................................................... 42
VEEL DATA ......................................................................................................................................... 45
International System of Units (SI ................................................................................................... 45
Namen van grote getallen ............................................................................................................. 47
Valse vrienden in de naamgeving van grote getallen ................................................................... 48
(SPECIALE) SOORTEN DATA ............................................................................................................... 49
Datawarehouse vs database ......................................................................................................... 50
OLTP vs OLAP ................................................................................................................................. 51
Soorten personal data: .................................................................................................................. 51
Dataficatie ..................................................................................................................................... 52
Big data .......................................................................................................................................... 52
Speciale soorten data – Metadata .................................................................................................... 54
Speciale soorten data – Efemere data .............................................................................................. 55
Speciale soorten data – Valse digitale data....................................................................................... 55
Speciale soorten data – Fotomanipulatie – Hoe manipulatie ontdekken? ....................................... 56
Speciale soorten data – Metadata .................................................................................................... 57
Speciale soorten data / Ambient data............................................................................................... 58
File slack ........................................................................................................................................ 59
Swap files ....................................................................................................................................... 61

1

, 2


JURIDISCH VERANTWOORD OMGAAN MET DATA – PRIVACY .......................................................... 61
Principes van privacy ......................................................................................................................... 63
Principes van privacy - Bijzondere persoonsgegevens ...................................................................... 64
Principes van privacy ......................................................................................................................... 68
Data classificatie ................................................................................................................................ 70
Data classificatie – Strikt vertrouwelijk ......................................................................................... 70
Data classificatie - Vertrouwelijk .................................................................................................. 71
Niet vertrouwelijk .......................................................................................................................... 71
Bijzondere persoonsgegevens ....................................................................................................... 72
Gewone persoonsgegevens .......................................................................................................... 72
Data classificatie ................................................................................................................................ 73
GDPR General Data Protection Regulation ...................................................................................... 74
Les 3 : Cryptografie ..................................................................................................................... 78
Inleiding ................................................................................................................................. 79
Definities cryptografie ............................................................................................................ 80
Categorieën van cryptografische methoden ............................................................................ 81
Basisdiensten van cryptografie ................................................................................................ 83
Stap 2: Hoe kunnen we digitaal iets vergrendelen en identificeren? ......................................... 84
Hashfuncties in een sleuteloze wereld ..................................................................................... 84
Kenmerken ............................................................................................................................. 85
Voorbeelden .......................................................................................................................... 86
Aanvullende cryptografische concepten voor hashfuncties ...................................................... 87
Hashing doeleinden: vergelijken van gegevens ........................................................................ 91
Hashing doeleinden detecteren van veranderingen in gegevens .............................................. 97
Hashing doeleinden hash referenties (gaat over de plaats waar hash opgeslagen is) ................ 98
Hashing doeleinde gegevens opslaan op een wijzigingsgevoelige manier ................................. 98
Hashing doeleinden hashfunctie als tool hashpuzzels .............................................................101
Uitdaging...............................................................................................................................105
Symmetrische cryptografie ....................................................................................................107
Asymmetrische cryptografie ..................................................................................................108
Gebruik van crytografie .........................................................................................................110
Data confidentialiteit geheimhouding exclusiviteit .................................................................110
Data integriteit ......................................................................................................................111
Data authenticiteit asymmetrisch ..........................................................................................113
Combinatie data confidentialiteit en data integriteit ..............................................................114
Les 4 .........................................................................................................................................116

2

, 3


Digitale handtekening ............................................................................................................116
Basisversie ............................................................................................................................118
Basisversie potentieel probleem ............................................................................................119
Basisversie met exclusiviteit van de klaartekst .......................................................................120
Digitale certificaten als echtheidsbewijs .................................................................................122
Basisbegrippen certificaat ......................................................................................................123
Inhoud van een digitaal certificaat .........................................................................................124
Roor certificate store RCS ......................................................................................................124
Digitale certificaten op uw EID ...............................................................................................125
Soorten webserver digitale certificaten ..................................................................................126
Domain Validation certificaten ...........................................................................................126
Organisation Validation certificaten ...................................................................................126
Extended Validation certificaten.........................................................................................127
Certificaat verificatie kleuren .................................................................................................128
Certificaat fouten ..................................................................................................................128
Certificaatfouten revoked ......................................................................................................129
Public Key Insfrastructure (PKI) ..............................................................................................130
Hoe wordt pki gebruikt ..........................................................................................................132
PKI sterke en'zwakke punten .................................................................................................133
PKI architecturen ...................................................................................................................134
Certificate chain – chain of trust .............................................................................................134
Hoe een fake website identificeren ........................................................................................137
Controle van digitale certificaten Uitdaging ............................................................................140
Certificate Transparency(CT) ..................................................................................................141
Controle van digitale certificaten ...........................................................................................144
Een Merkle Consistency Proof (MCP) ......................................................................................145
Merkle Audit Proof (MAP)......................................................................................................147
Les 5 blockchain technologie.............................................................................................................. 151
Centralised versus Distributed ........................................................................................................ 155
Voordelen ........................................................................................................................................ 155
Nadelen ........................................................................................................................................... 156
Peer to Peer (P2P) systems ............................................................................................................. 157
Trust and integrity in purely distributed P2P systems .................................................................... 159
Double spending Problem of distributed P2P systems of ledgers ................................................ 160
A ledger as a foundation of ownership ........................................................................................... 161
Ownership and the blockchain ........................................................................................................ 162

3

, 4


How the blockchain works .............................................................................................................. 162
Task 1: Describing ownership .......................................................................................................... 163
Task 2: Protecting ownership .......................................................................................................... 165
Task 3: Storing transaction data ...................................................................................................... 167
Task 4: Preparing ledgers to be distributed in an untrustworthy environment ............................. 172
Task 5: Distributing the ledgers ....................................................................................................... 176
Task 6: Adding new transactions to the ledgers ............................................................................. 177
Task 7: Deciding which ledgers represent the truth ....................................................................... 181
WHAT IS THE BLOCKCHAIN? ............................................................................................................ 184
SMART CONTRACTS – Blockchain 2.0.............................................................................................. 188
Smart contracts benefits ................................................................................................................. 190
Smart contracts and Oracles ........................................................................................................... 190
Smart contracts Ethereum ............................................................................................................. 191
BUSINESS IMPACT OF THE BLOCKCHAIN ......................................................................................... 193
Business use of the blockchain – Proof of existence....................................................................... 194
Business use of the blockchain – Proof of nonexistence ................................................................ 194
Business use of the blockchain – Proof of time .............................................................................. 194
Business use of the blockchain – Proof of order ............................................................................. 194
Business use of the blockchain – Proof of authorship .................................................................... 195
Business use of the blockchain – Proof of ownership ..................................................................... 195
Business impact of the blockchain – Actual usage .......................................................................... 196
Major accomplishments of the blockchain ..................................................................................... 196




4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller HWSamenvatting. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $6.14. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

66579 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$6.14
  • (0)
  Add to cart