IT-Security (own) at Frankfurt University Of Applied Sciences | Flashcards & Summaries

Suggested languages for you:

It looks like you are in the US?
We have a website for your region.

# Lernmaterialien für IT-Security (own) an der Frankfurt University of Applied Sciences

Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen IT-Security (own) Kurs an der Frankfurt University of Applied Sciences zu.

TESTE DEIN WISSEN

What is a prime?

Lösung anzeigen
TESTE DEIN WISSEN

A prime is a number where its divisors are only 1 and the number itself

Lösung ausblenden
TESTE DEIN WISSEN

With what does a security concept start?

Lösung anzeigen
TESTE DEIN WISSEN

It starts with a risk assessment.

Lösung ausblenden
TESTE DEIN WISSEN

What is a stochastic random process?

Lösung anzeigen
TESTE DEIN WISSEN

A stochastic random process is a process, generating random numbers in a certain interval. The probability for a certain value E out of that interval can be calculated.

Lösung ausblenden
TESTE DEIN WISSEN

What are the 4 commandments (Gebote) of the internet economy?

Lösung anzeigen
TESTE DEIN WISSEN
1. Compliance (Einhaltung von Vorschriften) & Transparency
2. Security IT Landscape
3. Data protection
4. Safeness of IT processes
Lösung ausblenden
TESTE DEIN WISSEN

Explain Confidentiality

Lösung anzeigen
TESTE DEIN WISSEN

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Lösung ausblenden
TESTE DEIN WISSEN

Explain Confidentiality

Lösung anzeigen
TESTE DEIN WISSEN

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Lösung ausblenden
TESTE DEIN WISSEN

What is the definition of legacy IT Security?

Lösung anzeigen
TESTE DEIN WISSEN

Legacy IT Security concerns the security of isolated systems which are connected in an isolated realm (Bereich) e.g. Intranet.

Typically master/slave communication and a host-centric network.

Lösung ausblenden
TESTE DEIN WISSEN

What does a random generator and a pseudo random generator?

Lösung anzeigen
TESTE DEIN WISSEN

A real random generator outputs real random numbers which are based on physical events (cosmic radiation, thermal noise, ...). (Implementation of a binary symmetric source BSS)

A pseudo-random generator deterministically chooses numbers but those numbers behave like random numbers. Computer always implement pseudo BSS.

Lösung ausblenden
TESTE DEIN WISSEN

What is the problem with the CIA-Triangle?

Lösung anzeigen
TESTE DEIN WISSEN

Back in 1977 there was no "data market", so IT Systems where used only by authorized personnel and "authentication was equivalent to knowing the system.

Today all kinds of people can interact with IT systems due to the internet.

=> Identity theft plays a big role today but not in 1977

Lösung ausblenden
TESTE DEIN WISSEN

What are the 4 security aims for data protection?

Lösung anzeigen
TESTE DEIN WISSEN

Authenticity: The data originate verifiable from a certain communication partner.

Confidentiality: Restricted access to data, devices for entitled (berechtigte) persons only. Considering "data-at-rest", "data-in-flight", "data-in-use".

Integrity: Protection of data regarding manipulation and destruction given a third party.

Availability: Data, devices and infrastructure components are available on demand. Unrestricted and uncompromised access to data for the entitled ones.

Lösung ausblenden
TESTE DEIN WISSEN

What does data-at-rest, data-in-flight and data-in-use mean?

Lösung anzeigen
TESTE DEIN WISSEN

data-at-rest: stored data

data-in-flight: data crossing a network

data-in-use: data in memory (RAM)

Lösung ausblenden
TESTE DEIN WISSEN

What is important at the computation of primes for cryptographic purposes?

Lösung anzeigen
TESTE DEIN WISSEN

1. Determining primes p in a qualified fast manner

2. quantify very fast, if the purported (vermeintliche) number p is a real prime

Used methods:

• Sieve of Erastosthenes (Sieb)
• Euler's function

=> Estimate primes. Up to now, there is no algorithm to calculate prime numbers

==> So statistical tests are used to check, if it is a real prime.

Lösung ausblenden
• 26899 Karteikarten
• 1210 Studierende
• 8 Lernmaterialien

## Beispielhafte Karteikarten für deinen IT-Security (own) Kurs an der Frankfurt University of Applied Sciences - von Kommilitonen auf StudySmarter erstellt!

Q:

What is a prime?

A:

A prime is a number where its divisors are only 1 and the number itself

Q:

With what does a security concept start?

A:

It starts with a risk assessment.

Q:

What is a stochastic random process?

A:

A stochastic random process is a process, generating random numbers in a certain interval. The probability for a certain value E out of that interval can be calculated.

Q:

What are the 4 commandments (Gebote) of the internet economy?

A:
1. Compliance (Einhaltung von Vorschriften) & Transparency
2. Security IT Landscape
3. Data protection
4. Safeness of IT processes
Q:

Explain Confidentiality

A:

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Q:

Explain Confidentiality

A:

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Q:

What is the definition of legacy IT Security?

A:

Legacy IT Security concerns the security of isolated systems which are connected in an isolated realm (Bereich) e.g. Intranet.

Typically master/slave communication and a host-centric network.

Q:

What does a random generator and a pseudo random generator?

A:

A real random generator outputs real random numbers which are based on physical events (cosmic radiation, thermal noise, ...). (Implementation of a binary symmetric source BSS)

A pseudo-random generator deterministically chooses numbers but those numbers behave like random numbers. Computer always implement pseudo BSS.

Q:

What is the problem with the CIA-Triangle?

A:

Back in 1977 there was no "data market", so IT Systems where used only by authorized personnel and "authentication was equivalent to knowing the system.

Today all kinds of people can interact with IT systems due to the internet.

=> Identity theft plays a big role today but not in 1977

Q:

What are the 4 security aims for data protection?

A:

Authenticity: The data originate verifiable from a certain communication partner.

Confidentiality: Restricted access to data, devices for entitled (berechtigte) persons only. Considering "data-at-rest", "data-in-flight", "data-in-use".

Integrity: Protection of data regarding manipulation and destruction given a third party.

Availability: Data, devices and infrastructure components are available on demand. Unrestricted and uncompromised access to data for the entitled ones.

Q:

What does data-at-rest, data-in-flight and data-in-use mean?

A:

data-at-rest: stored data

data-in-flight: data crossing a network

data-in-use: data in memory (RAM)

Q:

What is important at the computation of primes for cryptographic purposes?

A:

1. Determining primes p in a qualified fast manner

2. quantify very fast, if the purported (vermeintliche) number p is a real prime

Used methods:

• Sieve of Erastosthenes (Sieb)
• Euler's function

=> Estimate primes. Up to now, there is no algorithm to calculate prime numbers

==> So statistical tests are used to check, if it is a real prime.

### Erstelle und finde Lernmaterialien auf StudySmarter.

Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.

## Das sind die beliebtesten StudySmarter Kurse für deinen Studiengang IT-Security (own) an der Frankfurt University of Applied Sciences

Für deinen Studiengang IT-Security (own) an der Frankfurt University of Applied Sciences gibt es bereits viele Kurse, die von deinen Kommilitonen auf StudySmarter erstellt wurden. Karteikarten, Zusammenfassungen, Altklausuren, Übungsaufgaben und mehr warten auf dich!

## Das sind die beliebtesten IT-Security (own) Kurse im gesamten StudySmarter Universum

Technikum Wien

##### IT Security

Johannes Kepler Universität Linz

##### IT-Security

Hochschule Konstanz

##### IT-Security

ZHAW - Zürcher Hochschule für Angewandte Wissenschaften