National Cyber Security Centre - Ministry of Security and Justice

Factsheets RSS feed

Read the factsheets of the NCSC.

  • Factsheet Building a SOC: start small

    November 15, 2017

    An increasingly common way to achieve visibility and control of information security is to implement a Security Operations Centre (SOC). In order for a SOC to function successfully, it must be tied in with the business processes. This makes building a SOC a major challenge. Due to the many organizational and technical issues that come to mind when setting up a SOC, it...

  • Factsheet Post-quantum cryptography

    November 7, 2017

    The emergence of quantum computers can have major implications for organizations that process sensitive information. Using a future quantum computer, one can decrypt data that is encrypted with popular cryptographic algorithms. The consequences are, however, even more serious. Encrypted data may already be intercepted, awaiting the possibility to decrypt the data with a...

  • Factsheet Choosing a messaging app for your organisation

    September 8, 2017

    Using publicly available messaging apps for business communication involves certain risks and has consequences for both your organisation and information sharing. This factsheet will elaborate on what kind of organisational risks exist when employees use such a publicly available messaging app.

  • Factsheet Indicators of Compromise

    June 1, 2017

    In order to observe malicious digital activities within an organisation, Indicators of Compromise (IoCs) are a valuable asset. With IoCs, organisations can gain quick insights at central points in the network into malicious digital activities. When your organisation observes these activities, it is important to know what you can do to trace back which system is infected....

  • Factsheet Secure the connections of mail servers

    April 4, 2017

    Traditionally, connections between mail servers have hardly been secured. STARTTLS is an extension to provide existing protocols with connection security. If you only use STARTTLS to secure connections between mail servers, this will protect against so-called passive attackers. An active attacker can easily undo the use of STARTTLS. The DANE protocol allows you to...

CSAN 2017

CSAN 2017