Categorie:Toegestane eindpunten voor Gevraagde relevante standaarden
Naar navigatie springen
Naar zoeken springen
Pagina’s in categorie "Toegestane eindpunten voor Gevraagde relevante standaarden"
Deze categorie bevat de volgende 177 pagina’s, van de 177 in totaal.
A
B
C
D
- Datum en Tijd
- DCAT
- DCAT-AP-DONL
- DHCP
- Digikoppeling
- Digitoegankelijk (EN 301 549 met WCAG 2.1)
- DKIM
- DMARC
- DNS
- DNSSEC
- DoD 5015.2-STD:2007 Electronic Records Management Software Applications Design Criteria Standard
- Dublin Core metadata element set
- DUTO (Normenkader Duurzaam Toegankelijke Overheidsinformatie)
E
I
- IEEE 802.x (Port-based Network Access Control )
- IFC
- IFC
- INSPIRE (standaard)
- IPv6 en IPv4
- ISAAR(CPF)
- ISAD(G): General International Standard Archival Description
- ISO 14721:2012 Space data and information transfer systems - Open archival information system (OAIS) - Reference model
- ISO 19109
- ISO 19115
- ISO 19136
- ISO/IEC 11179
- ISO/IEC 15408
- ISO/TS 19103
- ISO 42010
M
N
- Nederlands metadataprofiel op ISO 19115
- Nederlands profiel op ISO 19142
- NEN 2082
- NEN 3610
- NEN-EN-ISO 19110
- NEN-EN-ISO 22313:2020 (Richtlijnen voor het gebruik van ISO 22301)
- NEN-EN-ISO 50001:2018 (Energiemanagementsystemen - Eisen met gebruiksrichtlijnen)
- NEN-ISO/IEC 27001
- NEN-ISO/IEC 27002
- NEN-EN-ISO/IEC 27018:2020 (Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
- NEN-EN-ISO/IEC 27040:2016 (Storage security)
- NEN-ISO 13008
- NEN-ISO 15489-1
- NEN-ISO 16175-1
- NEN-ISO 16175-2
- NEN-ISO 16175-3
- NEN-ISO 23081-1
- NEN-ISO 23081-2
- NEN-ISO 27033-1 (Network security - Overview and concepts)
- NEN-ISO 30300
- NEN-ISO 30301
- NEN-ISO 30302:2015
- NEN-ISO 31000:2018 (Risicomanagement - Richtlijnen)
- NEN-ISO/IEC 17788:2014 (Cloud computing - Overview and vocabulary)
- NEN-ISO/IEC 17789:2014 (Cloud computing - Reference architecture)
- NEN-ISO/IEC 18033-1:2015 (IT Security techniques - Encryption algorithms - General)
- NEN-ISO/IEC 18033-2:2006 (IT Security techniques - Encryption algorithms - Asymmetric ciphers)
- NEN-ISO/IEC 18033-3:2005 (IT Security techniques - Encryption algorithms - Block ciphers)
- NEN-ISO/IEC 18033-4:2012 (IT Security techniques - Encryption algorithms - Stream ciphers )
- NEN-ISO/IEC 18033-5:2015 (IT Security techniques - Encryption algorithms - Identity-based ciphers)
- NEN-ISO/IEC 19086-1:2016 (Service level agreement (SLA) framework - Part 1: Overview and concepts)
- NEN-ISO/IEC 19941:2017 (Information technology - Cloud computing - Interoperability and portability)
- NEN-ISO/IEC 25010:2011 (Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models)
- NEN-ISO/IEC 27003:2017 (Security techniques - Information security management systems - Guidance)
- NEN-ISO/IEC 27005:2018 (Information security risk management)
- NEN-ISO/IEC 27007:2017 (Guidelines for information security management systems auditing)
- NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services)
- NEN-ISO/IEC 27018:2014 (Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
- NEN-ISO/IEC 27021:2017 (Competence requirements for information security management systems professionals)
- NEN-ISO/IEC 27033-1:2015 (Network security - Overview and concepts)
- NEN-ISO/IEC 27033-2:2012 (Network security - Guidelines for the design and implementation of network security)
- NEN-ISO/IEC 27033-3:2010 (Network security - Reference networking scenarios - Threats, design techniques and control issues)
- NEN-ISO/IEC 27033-4:2014 (Network security - Securing communications between networks using security gateways)
- NEN-ISO/IEC 27033-5:2013 (Network security - Securing communications across networks using Virtual Private Networks)
- NEN-ISO/IEC 27033-6:2016 (Securing wireless IP network acces)
- NEN-ISO/IEC 27034-5:2017 (Protocols and application security controls data structure)
- NEN-ISO/IEC 7498-4:1989 (Information processing systems - Open Systems Interconnection - Basic Reference Model - Management framework)
- NEN-ISO/IEC 7498-4:1991 (Informatietechnologie - Onderlinge verbinding van open systemen (OSI) - Basisreferentiemodel - Deel 4 - Beheerskader)
- NEN-ISO/IEC DIS 18033-6 (IT Security techniques - Encryption algorithms - Homomorphic encryption)
- NIST SP 800-145 (The NIST Definition of Cloud Computing)
- NIST SP 800-160 2016 (Systems Security Engineering)
- NIST SP 800-27 Rev. A 2004 (Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
- NIST SP 800-53 Rev. 5 2020 (Security and Privacy Controls for Information Systems and Organizations)
- NL GOV Assurance profile for OAuth 2.0
- NL LOM
- NLCIUS
- NLCS
- NLRS
- NPR 2083
- NPR-ISO TR 13028
- NPR-ISO TR 15801
- NPR-ISO TR 18128:2014
- NPR-ISO TR 23081-3
- NPR-ISO TR 26122
- NTA9040