1 e 2 Flashcards

1
Q

problemi di oggi (cybersecurity)

A

tanti sistemi, molto complessi, attacchi diretti, attacchi indiretti, kiss rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

risk estimation

A

asset->vulnerability->threat (volontario attacco, involontario incidente), security requirement e control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security process

A

security è processo non prodotto, security set-up e day2day security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

woe window of exposure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

motivazioni e relativi attaccanti

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

principi sicurezza

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security properties

A

cia, peer authN(single/mutual), data origin authN, identification , non-repudiation, authZ, data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dov’è l’enemy

A

zero trust architecture, enemy ovunque

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attacchi e contromisure

A

replay attack, ip spoofing, packet sniffing, DoS,DDoS, fake server, connection hijacking, trojan, virus/worm, ransomware, phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

framework for cybersecurity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

kerchoff principle

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

symm crypto

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

des (3des,2des e relativo attacco)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

rc2 e rc4

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ecb

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

padding (cosa fare quando data>blocco e data<blocco?)

A

integrity check

20
Q

stream algo

21
Q

salsa20 e chacha20

23
Q

asymm crypto -> funzionalità

24
Q

rsa (attacco)

25
Q

dh e ecdh (attacco)

26
Q

message integrity-> hash (caratteristiche)

A

fast to compute, pre-image resistant, collision resistant

27
Q

collisioni e birthday attack

A

dipende da lunghezza hash p[aliasing] proporzionale a 2^-N, 50% se generati 2^N/2 hash, parametro sicurezza hash rispetto a symm enc

28
Q

kdf

A

chiavi devono essere casuali,kdf(pwd,salt,n°iterazioni),usano hash

29
Q

keyed digest

A

no non repudiation

30
Q

cbc-mac e attacco

31
Q

secrecy e integrity

33
Q

aead e esempi

A

ige,gcm,ccm,aeskw

34
Q

lightweight crypto , quali sono problemi?

35
Q

authN con asymm crypto

A

non-repudiation, + strong di firma cartacea

36
Q

x.509 certificate alcuni campi e a cosa serve

37
Q

crl e ocsp

A

è dovere del receiver stabilire se la firma was valid at signature time

38
Q

problema ricorsivo certificati chiavi pubbliche