Categorie:Toegestane eindpunten voor Niet-gevraagde relevante standaarden
Naar navigatie springen
Naar zoeken springen
Pagina’s in categorie "Toegestane eindpunten voor Niet-gevraagde relevante standaarden"
Deze categorie bevat de volgende 177 pagina’s, van de 177 in totaal.
A
B
C
D
- Datum en Tijd
- DCAT
- DCAT-AP-DONL
- DHCP
- Digikoppeling
- Digitoegankelijk (EN 301 549 met WCAG 2.1)
- DKIM
- DMARC
- DNS
- DNSSEC
- DoD 5015.2-STD:2007 Electronic Records Management Software Applications Design Criteria Standard
- Dublin Core metadata element set
- DUTO (Normenkader Duurzaam Toegankelijke Overheidsinformatie)
E
I
- IEEE 802.x (Port-based Network Access Control )
- IFC
- IFC
- INSPIRE (standaard)
- IPv6 en IPv4
- ISAAR(CPF)
- ISAD(G): General International Standard Archival Description
- ISO 14721:2012 Space data and information transfer systems - Open archival information system (OAIS) - Reference model
- ISO 19109
- ISO 19115
- ISO 19136
- ISO/IEC 11179
- ISO/IEC 15408
- ISO/TS 19103
- ISO 42010
M
N
- Nederlands metadataprofiel op ISO 19115
- Nederlands profiel op ISO 19142
- NEN 2082
- NEN 3610
- NEN-EN-ISO 19110
- NEN-EN-ISO 22313:2020 (Richtlijnen voor het gebruik van ISO 22301)
- NEN-EN-ISO 50001:2018 (Energiemanagementsystemen - Eisen met gebruiksrichtlijnen)
- NEN-ISO/IEC 27001
- NEN-ISO/IEC 27002
- NEN-EN-ISO/IEC 27018:2020 (Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
- NEN-EN-ISO/IEC 27040:2016 (Storage security)
- NEN-ISO 13008
- NEN-ISO 15489-1
- NEN-ISO 16175-1
- NEN-ISO 16175-2
- NEN-ISO 16175-3
- NEN-ISO 23081-1
- NEN-ISO 23081-2
- NEN-ISO 27033-1 (Network security - Overview and concepts)
- NEN-ISO 30300
- NEN-ISO 30301
- NEN-ISO 30302:2015
- NEN-ISO 31000:2018 (Risicomanagement - Richtlijnen)
- NEN-ISO/IEC 17788:2014 (Cloud computing - Overview and vocabulary)
- NEN-ISO/IEC 17789:2014 (Cloud computing - Reference architecture)
- NEN-ISO/IEC 18033-1:2015 (IT Security techniques - Encryption algorithms - General)
- NEN-ISO/IEC 18033-2:2006 (IT Security techniques - Encryption algorithms - Asymmetric ciphers)
- NEN-ISO/IEC 18033-3:2005 (IT Security techniques - Encryption algorithms - Block ciphers)
- NEN-ISO/IEC 18033-4:2012 (IT Security techniques - Encryption algorithms - Stream ciphers )
- NEN-ISO/IEC 18033-5:2015 (IT Security techniques - Encryption algorithms - Identity-based ciphers)
- NEN-ISO/IEC 19086-1:2016 (Service level agreement (SLA) framework - Part 1: Overview and concepts)
- NEN-ISO/IEC 19941:2017 (Information technology - Cloud computing - Interoperability and portability)
- NEN-ISO/IEC 25010:2011 (Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models)
- NEN-ISO/IEC 27003:2017 (Security techniques - Information security management systems - Guidance)
- NEN-ISO/IEC 27005:2018 (Information security risk management)
- NEN-ISO/IEC 27007:2017 (Guidelines for information security management systems auditing)
- NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services)
- NEN-ISO/IEC 27018:2014 (Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
- NEN-ISO/IEC 27021:2017 (Competence requirements for information security management systems professionals)
- NEN-ISO/IEC 27033-1:2015 (Network security - Overview and concepts)
- NEN-ISO/IEC 27033-2:2012 (Network security - Guidelines for the design and implementation of network security)
- NEN-ISO/IEC 27033-3:2010 (Network security - Reference networking scenarios - Threats, design techniques and control issues)
- NEN-ISO/IEC 27033-4:2014 (Network security - Securing communications between networks using security gateways)
- NEN-ISO/IEC 27033-5:2013 (Network security - Securing communications across networks using Virtual Private Networks)
- NEN-ISO/IEC 27033-6:2016 (Securing wireless IP network acces)
- NEN-ISO/IEC 27034-5:2017 (Protocols and application security controls data structure)
- NEN-ISO/IEC 7498-4:1989 (Information processing systems - Open Systems Interconnection - Basic Reference Model - Management framework)
- NEN-ISO/IEC 7498-4:1991 (Informatietechnologie - Onderlinge verbinding van open systemen (OSI) - Basisreferentiemodel - Deel 4 - Beheerskader)
- NEN-ISO/IEC DIS 18033-6 (IT Security techniques - Encryption algorithms - Homomorphic encryption)
- NIST SP 800-145 (The NIST Definition of Cloud Computing)
- NIST SP 800-160 2016 (Systems Security Engineering)
- NIST SP 800-27 Rev. A 2004 (Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
- NIST SP 800-53 Rev. 5 2020 (Security and Privacy Controls for Information Systems and Organizations)
- NL GOV Assurance profile for OAuth 2.0
- NL LOM
- NLCIUS
- NLCS
- NLRS
- NPR 2083
- NPR-ISO TR 13028
- NPR-ISO TR 15801
- NPR-ISO TR 18128:2014
- NPR-ISO TR 23081-3
- NPR-ISO TR 26122
- NTA9040