Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen IT-Security (own) Kurs an der Frankfurt University of Applied Sciences zu.
What is a prime?
A prime is a number where its divisors are only 1 and the number itself
With what does a security concept start?
It starts with a risk assessment.
What is a stochastic random process?
A stochastic random process is a process, generating random numbers in a certain interval. The probability for a certain value E out of that interval can be calculated.
What are the 4 commandments (Gebote) of the internet economy?
Explain Confidentiality
Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.
Explain Confidentiality
Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.
What is the definition of legacy IT Security?
Legacy IT Security concerns the security of isolated systems which are connected in an isolated realm (Bereich) e.g. Intranet.
Typically master/slave communication and a host-centric network.
What does a random generator and a pseudo random generator?
A real random generator outputs real random numbers which are based on physical events (cosmic radiation, thermal noise, ...). (Implementation of a binary symmetric source BSS)
A pseudo-random generator deterministically chooses numbers but those numbers behave like random numbers. Computer always implement pseudo BSS.
What is the problem with the CIA-Triangle?
Back in 1977 there was no "data market", so IT Systems where used only by authorized personnel and "authentication was equivalent to knowing the system.
Today all kinds of people can interact with IT systems due to the internet.
=> Identity theft plays a big role today but not in 1977
What are the 4 security aims for data protection?
Authenticity: The data originate verifiable from a certain communication partner.
Confidentiality: Restricted access to data, devices for entitled (berechtigte) persons only. Considering "data-at-rest", "data-in-flight", "data-in-use".
Integrity: Protection of data regarding manipulation and destruction given a third party.
Availability: Data, devices and infrastructure components are available on demand. Unrestricted and uncompromised access to data for the entitled ones.
What does data-at-rest, data-in-flight and data-in-use mean?
data-at-rest: stored data
data-in-flight: data crossing a network
data-in-use: data in memory (RAM)
What is important at the computation of primes for cryptographic purposes?
1. Determining primes p in a qualified fast manner
2. quantify very fast, if the purported (vermeintliche) number p is a real prime
Used methods:
=> Estimate primes. Up to now, there is no algorithm to calculate prime numbers
==> So statistical tests are used to check, if it is a real prime.
Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.
Jetzt loslegenFür deinen Studiengang IT-Security (own) an der Frankfurt University of Applied Sciences gibt es bereits viele Kurse, die von deinen Kommilitonen auf StudySmarter erstellt wurden. Karteikarten, Zusammenfassungen, Altklausuren, Übungsaufgaben und mehr warten auf dich!