Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Inzet van kennisportals tussen organisatie en klant

578 views

Published on

Workshop Boyd Hendriks
3 maart 2016, VOGIN-IP-lezing, Amsterdam

Published in: Business
  • Be the first to comment

  • Be the first to like this

Inzet van kennisportals tussen organisatie en klant

  1. 1. Workshop “Inzet van kennisportals tussen organisatie en klant” Boyd Hendriks Vogin-IP lezing 3 maart 2016
  2. 2. Klant Of gebruiker €Dienstverlener Traditioneel verdienmodel van dienstverlening
  3. 3. taxonomie K-kaart I-kaart Kennis/ dossiers adviseur Dienstverlener 100% advies 100% informatie Klant of gebruiker Kennismanagement Verbreed verdienmodel van dienstverlening
  4. 4. Klant of relatieportaal Kennis/ dossiers adviseur Dienstverlener 100% advies 100% informatie Klant of gebruiker Kennismanagement
  5. 5. Wie is de klant of de gebruiker
  6. 6. regio organisatie Team / afdeling individu global
  7. 7. Dienst- verlener Klant of gebruiker Private -cloud Public -cloud
  8. 8. Architectuur
  9. 9. Information Listed clustered prioritised abstracted Alerted analysed recommended concluded Information value chain
  10. 10. Dienst- verlener Klant of gebruiker Private -cloud Public -cloud Security
  11. 11. Private -cloud Public -cloud 1-Footprinting - Determining the targets footprint, e.g. DNS records, IP scope, public information, contact information, etc. 2-Scanning - Determining the targets openings, e.g. service ports, wireless networks, modems pools, vpn servers, etc. 3-Enumeration - Determining the services behind the openings, e.g. webservers, systems, routers, firewalls, wifi authentication, etc. 4-Penetration - Selecting appropiate exploits and penetrate the target, e.g. SQL injection, buffer overflow, password attacks, etc. 5-Escalation - Escalation of the credentials to admin or root, e.g. dll injection, local exploit, configuration change, sceduled jobs, etc. 6-Getting Interactive - Getting a remote shell or GUI on the target, e.g. RDP, VNC, NetCat, etc. 7-Expanding Influence - Moving from the initial target as a foothold or beach-head to the rest of the network taking over the domain. 8-Cleaning Up - Ensuring backdoors and removing evidence, e.g. rootkits, log removal, log editing, etc. 9-Reporting - Writing and presenting a report on the pen-test to the owners of the network one had authoritation to test. Pentest
  12. 12. 2% aanjagers 14% snelle instappers 34% vroege helft 34% late helft 16% onwilligen stagnatie Het gebruik van het klantportaa Acceptatie Tijd
  13. 13. Dank voor uw aandacht Vragen ?

×