Difference between revisions of "Security/Hoe bescherm ik tegen aanvallen"
Jump to navigation
Jump to search
(Created page with "{{TBN}} <!-- :Web cast RedmondMag :: Slides als PDF in [file://DC1\o-disk\Adjaan\Overige\012915_supercast_redmond.pdf Redmond Mag] ::: {{URL|//DC1\o-disk\Adjaan\Overige\012915...") |
|||
Line 1: | Line 1: | ||
{{TBN}} | {{TBN}} | ||
− | + | === Introductie === | |
+ | |||
:Web cast RedmondMag | :Web cast RedmondMag | ||
:: Slides als PDF in [file://DC1\o-disk\Adjaan\Overige\012915_supercast_redmond.pdf Redmond Mag] | :: Slides als PDF in [file://DC1\o-disk\Adjaan\Overige\012915_supercast_redmond.pdf Redmond Mag] | ||
Line 14: | Line 15: | ||
:: Establish and maintain levels of security | :: Establish and maintain levels of security | ||
: NSA Guidelines | : NSA Guidelines | ||
− | + | <!-- | |
=== Surviving an Attack === | === Surviving an Attack === | ||
: Exfiltration | : Exfiltration |
Revision as of 17:23, 13 May 2023
Contents |
Deze pagina maakt deel uit van de serie Security. |
Introductie
- Web cast RedmondMag
- Slides als PDF in [file://DC1\o-disk\Adjaan\Overige\012915_supercast_redmond.pdf Redmond Mag]
- soorten breaches
- Verizon data breach report: vz.to/1DRmqK6
- SANS critical security controls
- Know your environment!
- Establish and maintain levels of security
- NSA Guidelines