Factsheets

Read the factsheets of the NCSC.

43 documents

Enter your search criteria

Enter a keyword to filter on

Enter a start and end date in this format: DD-MM-YYYY

Factsheet TLS interception

TLS interception makes encrypted connections within the network of an organisation accessible for inspection. The use of this technical measure should be carefully considered in the light of additional risks and should meet a number of important preconditions.

20-04-2018 | Factsheet

Factsheet Building a SOC: start small

An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre (SOC). In order for a SOC to function successfully, it must be tied in with the business processes. This makes building a SOC a major challenge. Due to the many organizational and technical issues that come to mind when setting up a SOC, it...

15-11-2017 | Factsheet

Factsheet Post-quantum cryptography

The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a future quantum computer, one can decrypt data that is encrypted with popular cryptographic algorithms. The consequences are, however, even more serious. Encrypted data may already be intercepted, awaiting the possibility to decrypt the data with a...

07-11-2017 | Factsheet

Factsheet Choosing a messaging app for your organisation

Using publicly available messaging apps for business communication involves certain risks and has consequences for both your organisation and information sharing. This factsheet will elaborate on what kind of organisational risks exist when employees use such a publicly available messaging app.

08-09-2017 | Factsheet

Factsheet Indicators of Compromise

In order to observe malicious digital activities within an organisation, Indicators of Compromise (IoCs) are a valuable asset. With IoCs, organisations can gain quick insights at central points in the network into malicious digital activities. When your organisation observes these activities, it is important to know what you can do to trace back which system is infected....

01-06-2017 | Factsheet

CSAN 2017

Nederland digitaal veilig