100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cybersecurity $7.93   Add to cart

Class notes

Cybersecurity

 6 views  0 purchase
  • Course
  • Institution

In dit document is alle informatie te vinden die in de colleges zijn besproken, van letterlijke relevante citaten van de docent en gastdocenten tot gegeven casussen die van pas kunnen komen tijdens het maken van je tentamen. Ook is de belangrijkste informatie gemarkeerd. Tot slot wordt er teruggebl...

[Show more]

Preview 4 out of 36  pages

  • April 26, 2022
  • 36
  • 2020/2021
  • Class notes
  • Gerben bakker
  • All classes
avatar-seller
Cybersecurity

Inhoud
Cybersecurity.........................................................................................................................................1
College 1: welkom in de wereld van Cybersecurity............................................................................4
Waarom is het erg als mijn data op straat ligt?.............................................................................4
OSINT.............................................................................................................................................4
Afkaderen definities en begrippen.................................................................................................4
Casus Carbanak:.............................................................................................................................5
Slachtoffers en dreiging.................................................................................................................6
Cybersecurity in organisaties: informatiebeveiliging en BIV..........................................................6
Ethisch hacken...............................................................................................................................6
College 2: risicoanalyse en het Cybersecurity Framework.................................................................7
Informatiebeveiliging en BIV..........................................................................................................7
Bedreigingen voor BIV...................................................................................................................8
Kwetsbaarheden............................................................................................................................8
Risico’s...........................................................................................................................................9
Risico’s en maatregelen bepalen Cybersecurity Framework van NIST...........................................9
Gastcollege Gerrit........................................................................................................................11
College 3: de (inter) nationale wereld van cybersecurity.................................................................12
Cybersecurity beeld Nederland...................................................................................................12
Cybersecuritybeeld Nederland:...................................................................................................12
5 speerpunten van Cybersecurity beeld Nederland (2018):........................................................12
Weerbaarheid/maatregelen........................................................................................................14
Nationale Infrastructuur..............................................................................................................16
College 4: de regionale wereld van Cybersecurity...........................................................................17
Voorbeeld van regionale cybersecurity.......................................................................................17
Regionale cybersecurity...............................................................................................................17
Veiligheidsregio’s.........................................................................................................................17
Gemeenten..................................................................................................................................17
Cybersecurity framework op regionaal niveau............................................................................18
College 5: cybersecurity en het MKB...............................................................................................19
Midden- en kleinbedrijf – de scope.............................................................................................19
Grootste knelpunten....................................................................................................................19

, Daders – individueel....................................................................................................................19
College 6: cybersecurity in grote private organisaties.....................................................................21
Afhankelijkheden van grote private organisaties.........................................................................21
Casus: Carbanak (katalysator cybersecurity)...............................................................................21
DDos aanvallen banken`..............................................................................................................21
Grote private organisaties – de scope.........................................................................................21
Cybersecurity framework NIST/cyber resilience..........................................................................22
Terugblik op lessenreeks..................................................................................................................24
College 1......................................................................................................................................24
College 2......................................................................................................................................24
College 3......................................................................................................................................24
College 4......................................................................................................................................24
Baseline voor tentamen...............................................................................................................25
Extra stof vanuit de gastcolleges.........................................................................................................26
Marc Smeets....................................................................................................................................26
Basisbeginselen omtrent internet................................................................................................26
DDoS aanval.................................................................................................................................26
Spoofing.......................................................................................................................................26
Patching.......................................................................................................................................26
Risico van het IoT (Internet of Things).........................................................................................26
Hoe werkt een hack? – de cyberkillchain –..................................................................................27
Redteaming..................................................................................................................................27
Saman Barjas...................................................................................................................................28
De architectuur van cybersecurity...............................................................................................28
Wat zijn assets? En welk risico hoort hierbij?..............................................................................28
Actoren........................................................................................................................................28
Pen(entratie)testen......................................................................................................................28
Gerrit Kortlever................................................................................................................................29
SOC – Security Operations Cenre.................................................................................................29
Twee soorten detectie.................................................................................................................29
Governance..................................................................................................................................29
De stappen van het Cybersecurity Framework volgens Gerrit Kortlever.....................................29
Citrix Casus...................................................................................................................................29
Robin Hoogduin...............................................................................................................................30
De rol van de CIO: Chief Information Officer...............................................................................30
De grootste dreigingen op het gebied van cybersecurity............................................................30

, De vijf stappen van het Cybersecurity Framework volgens Robin Hoogduin...............................30
Dave Woutersen..............................................................................................................................31
Het ontstaan van het NCSC..........................................................................................................31
Wat doet het NCSC?....................................................................................................................31
Wanneer rukt het NCSC uit?........................................................................................................31
Welke grote dreigingen identificeert Dave Woutersen?..............................................................31
Hoe weerbaar zijn de Nederlandse vitale sectoren?....................................................................31
Jeroen Schipper...............................................................................................................................32
Rol als CISO – Chief Information Security Officer.........................................................................32
Het Cybersecurity Framework volgens Jeroen Schipper..............................................................32
Uitdagingen in de respondfase....................................................................................................32
Rutger Leukfeldt..............................................................................................................................33
Waarom moest er een lectoraat komen voor cybersecurity in het MKB?...................................33
Waarom is MKB kwetsbaar?........................................................................................................33
Typische daderprofielen..............................................................................................................33
Waarom weten we niet veel over cybercriminelen?...................................................................33
Oplossingen.................................................................................................................................33
Jelle Groenendaal............................................................................................................................34
Schaduw-IT..................................................................................................................................34
Positieve voorbeelden.................................................................................................................34
Hoe gebruiken organisaties het Cybersecurity Framework?........................................................34
Resilience.....................................................................................................................................34
Lijst met definities, begrippen en afkortingen.............................................................................35

, College 1: welkom in de wereld van Cybersecurity
Introductie onderwerp Cybersecurity

OSINT – wat voor informatie ligt er op straat?

Definities cybersecurity en cybersafety

Informatiebeveiliging en BIV, Social Engineering, Cybercrime in enge en brede zin

Introductie in Hacking



Cyclische benadering van hoe herken je dreigingen en hoe ga je telkens een stap nemen om
interventies te doen

- Het kunnen identificeren van dreigingen
- De goede interventies zien in relatie tot de dreigingen in een casus
- Detection: vergelijken met preparatie
- Respons: o.b.v. informatie gegevens in staat zijn welke maatregelen geschikt zijn
- Recovery



Waarom is het erg als mijn data op straat ligt?
- Gerichte phishing aanvallen
- In combinatie met wachtwoord – identiteitsdiefstal
- Creditcard informatie – scammen
- Rijbewijs/id/paspoort – identiteitsfraude
- Medische gegevens – goudmijn aan data, identiteitsdiefstal, fraude, afpersing



Internet on Things is dat er steeds meer apparatuur is aangesloten op een netwerk. Dus met je
telefoon verwarming en boxen bedienen

- Zorg is inmiddels koploper op het gebied van datalekken
- Data kan ook worden gebruikt om reclame doeleinden om zeer gericht te adverteren



OSINT
- Open Source Intelligence
- Actief is dat je daar doelen bij hebt
- Passief kijk je naar algemene media (LinkedIn, Facebook)



Afkaderen definities en begrippen
- Cyberspace – twee verweven realiteiten; een grondlaag van technologie, inclusief de in die
technologie vastgelegde informatie en een grondlaag met gerealiseerde interactiepatronen.
Beide lagen creëren een sociale realiteit die we cyberspace noemen
 Deepweb is erg groot. Is een plek waar organisaties veel databases hebben
staan waar niet iedereen toegang tot heeft

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller naomivanengelen1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.93. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.93
  • (0)
  Add to cart