IT Security at Frankfurt University of Applied Sciences

Flashcards and summaries for IT Security at the Frankfurt University of Applied Sciences

Arrow Arrow

It’s completely free

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

Study with flashcards and summaries for the course IT Security at the Frankfurt University of Applied Sciences

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

Define the following Terms with respect IT Security and namea possible  attack on it 
1. Confidentiality
2. Availability

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

What is the difference between a vulnerability and a threat ?

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

Name the functionality and control type for each of the following controls:

1. Fence around a facility
2. Firewall
3. Backup policy

This was only a preview of our StudySmarter flashcards.
Flascard Icon Flascard Icon

Millions of flashcards created by students

Flascard Icon Flascard Icon

Create your own flashcards as quick as possible

Flascard Icon Flascard Icon

Learning-Assistant with spaced repetition algorithm

Sign up for free!

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

Is the following statement correct?
Having a memory-safe language, e.g., Java, Haskell, Rust or Go, a buffer overflow attack is impossible 

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

As an attacker, what do you have to do in order to exploit the vulnerability?

Provide an example

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

What do you expect to haven in case the vulnerability is exploited?

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

How can you fix the issue ? Describe the possible improvement either in Text or (pseudo) code 
This was only a preview of our StudySmarter flashcards.
Flascard Icon Flascard Icon

Millions of flashcards created by students

Flascard Icon Flascard Icon

Create your own flashcards as quick as possible

Flascard Icon Flascard Icon

Learning-Assistant with spaced repetition algorithm

Sign up for free!

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

What is the difference between a quantitative and qualitative risk analysis?

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

Bild
What kind of Mode of operation is depicted using the mentioned scheme? Is it a block or stream cipher ?

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

How do you evaluate the security of an information encrypted using the cipher mode of operation and algorithm? Explain.

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

Define nonce and initialization vector (IV) and name the difference.
This was only a preview of our StudySmarter flashcards.
Flascard Icon Flascard Icon

Millions of flashcards created by students

Flascard Icon Flascard Icon

Create your own flashcards as quick as possible

Flascard Icon Flascard Icon

Learning-Assistant with spaced repetition algorithm

Sign up for free!

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

Define a hash function and name 3 different applications

Your peers in the course IT Security at the Frankfurt University of Applied Sciences create and share summaries, flashcards, study plans and other learning materials with the intelligent StudySmarter learning app.

Get started now!

Flashcard Flashcard

Exemplary flashcards for IT Security at the Frankfurt University of Applied Sciences on StudySmarter:

IT Security

Define the following Terms with respect IT Security and namea possible  attack on it 
1. Confidentiality
2. Availability

Confidentiality= Prevent unauthorized disclosure of Data. 
Attack: Network sniffing, breaking encryption
availability= Ensure reliability and timely access to data and other resources to authorized subjects.
Attack: Denial of Service attack

IT Security

What is the difference between a vulnerability and a threat ?
A vulnerability is a weakness in a               (technical) system, while a threat is the danger of someone exploiting the existing vulnerability.

IT Security

Name the functionality and control type for each of the following controls:

1. Fence around a facility
2. Firewall
3. Backup policy

1. Deterrent physical control
2. Preventive technical control
3. Recovery administrative control (making a backup is technical while creating the policy is administrative)

IT Security

Is the following statement correct?
Having a memory-safe language, e.g., Java, Haskell, Rust or Go, a buffer overflow attack is impossible 
Yes, in case you have a memory-safe language it is not possible to generate buffer overflow attacks unless you have vulnerabilities in the language itself 

IT Security

As an attacker, what do you have to do in order to exploit the vulnerability?

Provide an example
In order to exploit the vulnerability, you have to provide at least one command-line Argument starting with letter a being more than 10 chars long, e.g., a1234567891

IT Security

What do you expect to haven in case the vulnerability is exploited?
The program terminates and the service is shut down 

IT Security

How can you fix the issue ? Describe the possible improvement either in Text or (pseudo) code 
You can check the size of the provided input and return an error message if it exceeds the allowed size or you can create a buffer with a variable length depending on the input size.

IT Security

What is the difference between a quantitative and qualitative risk analysis?
In quantitative risk analysis, you assess risk in terms of concrete number and associates costs while in quantitative risk analysis, risk determined according to experience and assessment of involved entities, e.g., on scales 

IT Security

Bild
What kind of Mode of operation is depicted using the mentioned scheme? Is it a block or stream cipher ?
The electronic codebook(ECB) Mode, which is a block cipher.

IT Security

How do you evaluate the security of an information encrypted using the cipher mode of operation and algorithm? Explain.
The AES encryption is secure but the mode of operation is insecure as it encrypts each block of information individually, such that relative information from one block to another may still be available and block with the same plaintext have the same ciphertext.

IT Security

Define nonce and initialization vector (IV) and name the difference.
A nonce is (usually) a fixed random number per message which is used as an input to each encrypted block, while an initialization vector (IV) IS (usually) a random number which is used as input for the first block during encryption. Both terms describe the same item with a different application.

IT Security

Define a hash function and name 3 different applications
A hash function is a mathematical function mapping an input of arbitrary length to a short fixed-size output. Due to this, it is non-invertible.  A hash function is used, e.g., to Store password securely (as a hash value), to check information integrity and as swift searchable data structure in programming language (hash tables).

Sign up for free to see all flashcards and summaries for IT Security at the Frankfurt University of Applied Sciences

Singup Image Singup Image
Wave

Other courses from your degree program

For your degree program IT Security at the Frankfurt University of Applied Sciences there are already many courses on StudySmarter, waiting for you to join them. Get access to flashcards, summaries, and much more.

Back to Frankfurt University of Applied Sciences overview page

IT-Security

Security 2

it sec

Media Security

Security

What is StudySmarter?

What is StudySmarter?

StudySmarter is an intelligent learning tool for students. With StudySmarter you can easily and efficiently create flashcards, summaries, mind maps, study plans and more. Create your own flashcards e.g. for IT Security at the Frankfurt University of Applied Sciences or access thousands of learning materials created by your fellow students. Whether at your own university or at other universities. Hundreds of thousands of students use StudySmarter to efficiently prepare for their exams. Available on the Web, Android & iOS. It’s completely free.

Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
X

StudySmarter - The study app for students

StudySmarter

4.5 Stars 1100 Rating
Start now!
X

Good grades at university? No problem with StudySmarter!

89% of StudySmarter users achieve better grades at university.

50 Mio Flashcards & Summaries
Create your own content with Smart Tools
Individual Learning-Plan

Learn with over 1 million users on StudySmarter.

Already registered? Just go to Login