IT-Security (own) at Frankfurt University Of Applied Sciences | Flashcards & Summaries

Lernmaterialien für IT-Security (own) an der Frankfurt University of Applied Sciences

Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen IT-Security (own) Kurs an der Frankfurt University of Applied Sciences zu.

TESTE DEIN WISSEN

What is a prime?

Lösung anzeigen
TESTE DEIN WISSEN

A prime is a number where its divisors are only 1 and the number itself

Lösung ausblenden
TESTE DEIN WISSEN

With what does a security concept start?

Lösung anzeigen
TESTE DEIN WISSEN

It starts with a risk assessment.

Lösung ausblenden
TESTE DEIN WISSEN

What is a stochastic random process?

Lösung anzeigen
TESTE DEIN WISSEN

A stochastic random process is a process, generating random numbers in a certain interval. The probability for a certain value E out of that interval can be calculated.

Lösung ausblenden
TESTE DEIN WISSEN

What are the 4 commandments (Gebote) of the internet economy?

Lösung anzeigen
TESTE DEIN WISSEN
  1. Compliance (Einhaltung von Vorschriften) & Transparency 
  2. Security IT Landscape
  3. Data protection
  4. Safeness of IT processes
Lösung ausblenden
TESTE DEIN WISSEN

Explain Confidentiality

Lösung anzeigen
TESTE DEIN WISSEN

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Lösung ausblenden
TESTE DEIN WISSEN

Explain Confidentiality

Lösung anzeigen
TESTE DEIN WISSEN

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Lösung ausblenden
TESTE DEIN WISSEN

What is the definition of legacy IT Security?

Lösung anzeigen
TESTE DEIN WISSEN

Legacy IT Security concerns the security of isolated systems which are connected in an isolated realm (Bereich) e.g. Intranet.

Typically master/slave communication and a host-centric network.

Lösung ausblenden
TESTE DEIN WISSEN

What does a random generator and a pseudo random generator?

Lösung anzeigen
TESTE DEIN WISSEN

A real random generator outputs real random numbers which are based on physical events (cosmic radiation, thermal noise, ...). (Implementation of a binary symmetric source BSS)

A pseudo-random generator deterministically chooses numbers but those numbers behave like random numbers. Computer always implement pseudo BSS.

Lösung ausblenden
TESTE DEIN WISSEN

What is the problem with the CIA-Triangle?

Lösung anzeigen
TESTE DEIN WISSEN

Back in 1977 there was no "data market", so IT Systems where used only by authorized personnel and "authentication was equivalent to knowing the system.

Today all kinds of people can interact with IT systems due to the internet.


=> Identity theft plays a big role today but not in 1977

Lösung ausblenden
TESTE DEIN WISSEN

What are the 4 security aims for data protection?

Lösung anzeigen
TESTE DEIN WISSEN

Authenticity: The data originate verifiable from a certain communication partner.


Confidentiality: Restricted access to data, devices for entitled (berechtigte) persons only. Considering "data-at-rest", "data-in-flight", "data-in-use".


Integrity: Protection of data regarding manipulation and destruction given a third party.


Availability: Data, devices and infrastructure components are available on demand. Unrestricted and uncompromised access to data for the entitled ones.

Lösung ausblenden
TESTE DEIN WISSEN

What does data-at-rest, data-in-flight and data-in-use mean?

Lösung anzeigen
TESTE DEIN WISSEN

data-at-rest: stored data

data-in-flight: data crossing a network

data-in-use: data in memory (RAM)

Lösung ausblenden
TESTE DEIN WISSEN

What is important at the computation of primes for cryptographic purposes?

Lösung anzeigen
TESTE DEIN WISSEN

1. Determining primes p in a qualified fast manner

2. quantify very fast, if the purported (vermeintliche) number p is a real prime


Used methods:

  • Sieve of Erastosthenes (Sieb)
  • Euler's function

=> Estimate primes. Up to now, there is no algorithm to calculate prime numbers

==> So statistical tests are used to check, if it is a real prime.

Lösung ausblenden
  • 16393 Karteikarten
  • 862 Studierende
  • 8 Lernmaterialien

Beispielhafte Karteikarten für deinen IT-Security (own) Kurs an der Frankfurt University of Applied Sciences - von Kommilitonen auf StudySmarter erstellt!

Q:

What is a prime?

A:

A prime is a number where its divisors are only 1 and the number itself

Q:

With what does a security concept start?

A:

It starts with a risk assessment.

Q:

What is a stochastic random process?

A:

A stochastic random process is a process, generating random numbers in a certain interval. The probability for a certain value E out of that interval can be calculated.

Q:

What are the 4 commandments (Gebote) of the internet economy?

A:
  1. Compliance (Einhaltung von Vorschriften) & Transparency 
  2. Security IT Landscape
  3. Data protection
  4. Safeness of IT processes
Q:

Explain Confidentiality

A:

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Mehr Karteikarten anzeigen
Q:

Explain Confidentiality

A:

Confidentiality (Vertraulichkeit): Protecting data, retaining privacy among business partners and not leaking data to third parties. => Confidentiality is used to make sure that nobody in between site A and B is able to read what data or information is sent between the to sites. To achieve this encryption algorithms are used.

Q:

What is the definition of legacy IT Security?

A:

Legacy IT Security concerns the security of isolated systems which are connected in an isolated realm (Bereich) e.g. Intranet.

Typically master/slave communication and a host-centric network.

Q:

What does a random generator and a pseudo random generator?

A:

A real random generator outputs real random numbers which are based on physical events (cosmic radiation, thermal noise, ...). (Implementation of a binary symmetric source BSS)

A pseudo-random generator deterministically chooses numbers but those numbers behave like random numbers. Computer always implement pseudo BSS.

Q:

What is the problem with the CIA-Triangle?

A:

Back in 1977 there was no "data market", so IT Systems where used only by authorized personnel and "authentication was equivalent to knowing the system.

Today all kinds of people can interact with IT systems due to the internet.


=> Identity theft plays a big role today but not in 1977

Q:

What are the 4 security aims for data protection?

A:

Authenticity: The data originate verifiable from a certain communication partner.


Confidentiality: Restricted access to data, devices for entitled (berechtigte) persons only. Considering "data-at-rest", "data-in-flight", "data-in-use".


Integrity: Protection of data regarding manipulation and destruction given a third party.


Availability: Data, devices and infrastructure components are available on demand. Unrestricted and uncompromised access to data for the entitled ones.

Q:

What does data-at-rest, data-in-flight and data-in-use mean?

A:

data-at-rest: stored data

data-in-flight: data crossing a network

data-in-use: data in memory (RAM)

Q:

What is important at the computation of primes for cryptographic purposes?

A:

1. Determining primes p in a qualified fast manner

2. quantify very fast, if the purported (vermeintliche) number p is a real prime


Used methods:

  • Sieve of Erastosthenes (Sieb)
  • Euler's function

=> Estimate primes. Up to now, there is no algorithm to calculate prime numbers

==> So statistical tests are used to check, if it is a real prime.

IT-Security (own)

Erstelle und finde Lernmaterialien auf StudySmarter.

Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.

Jetzt loslegen

Das sind die beliebtesten StudySmarter Kurse für deinen Studiengang IT-Security (own) an der Frankfurt University of Applied Sciences

Für deinen Studiengang IT-Security (own) an der Frankfurt University of Applied Sciences gibt es bereits viele Kurse, die von deinen Kommilitonen auf StudySmarter erstellt wurden. Karteikarten, Zusammenfassungen, Altklausuren, Übungsaufgaben und mehr warten auf dich!

Das sind die beliebtesten IT-Security (own) Kurse im gesamten StudySmarter Universum

IT Security

Frankfurt University of Applied Sciences

Zum Kurs

Die all-in-one Lernapp für Studierende

Greife auf Millionen geteilter Lernmaterialien der StudySmarter Community zu
Kostenlos anmelden IT-Security (own)
Erstelle Karteikarten und Zusammenfassungen mit den StudySmarter Tools
Kostenlos loslegen IT-Security (own)