{"id":1310,"date":"2015-12-10T19:44:07","date_gmt":"2015-12-10T19:44:07","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=1310"},"modified":"2016-09-11T01:02:40","modified_gmt":"2016-09-11T01:02:40","slug":"security","status":"publish","type":"page","link":"https:\/\/evosec.eu\/nl\/security\/","title":{"rendered":"IT-beveiliging"},"content":{"rendered":"<div class=\"well well-sm\">\n<p>Computer security computerbeveiliging,, ook bekend als cyberveiligheid of IT-beveiliging, is de bescherming van informatiesystemen tegen diefstal of schade aan de hardware, de software, en de informatie over hen, alsmede van een verstoring of misleiding van de diensten zij verstrekken. Het omvat fysieke toegang tot de hardware beheren, evenals de bescherming tegen schade die komen kan via netwerk toegang, gegevens en code injectie, en als gevolg van misbruik door exploitanten, opzettelijk, per ongeluk of door hen wordt bedrogen in af te wijken van veilige procedures.<\/p>\n<p>Computersystemen nu omvatten een zeer breed scala aan \\<\/p>\n<\/div>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Snelle SMB Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>WebSite veiligheid Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Netwerk Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Server Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Embedded apparaat beveiligingscontrole \/ IoT beveiligingscontrole<\/li>\n<\/ul>\n<p>We kunnen proeven, monitoring, oplossingen en consultancy voor:<\/p>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>URL\/opdracht injectie<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Gebroken verificatie \/ slechte sessiebeheer<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Lijdend voorwerp verwijzingen<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Blootstelling van gevoelige gegevens<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Bekende kwetsbaarheden van componenten<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Exploit ontwikkeling<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Bron Code analyse &#8211; vooral protocol implementeert<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Computer security computerbeveiliging,, ook bekend als cyberveiligheid of IT-beveiliging, is de bescherming van informatiesystemen tegen diefstal of schade aan de hardware, de software, en de informatie over hen, alsmede van een verstoring of misleiding van de diensten zij verstrekken. Het omvat fysieke toegang tot de hardware beheren, evenals de bescherming &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"nl","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"predecessor-version":[{"id":2136,"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/pages\/1310\/revisions\/2136"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/nl\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}