Chapter 8 Cryptographic Solutions Flashcards

1
Q

Elenca gli algoritmi di cifratura simmetrici (7)

A

DES
3DES
IDEA
AES
BLOWFISH
TWOFISH
RIVEST CIPHER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elenca gli algoritmi di cifratura asimmetrici

A

Diffie-Hellman
RSA
Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List common Hashing algorithms (4)

A

Message Digest Algorithm MD5
Secure Hash Algorithm SHA-1-2-3
RACE Integrity Primitive Evaluation Message Digest RIPEMD
Hash Based Message Authentication Code HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List of common algorithms for Digital Signature (2)

A

DSA Digital Signature Algorithm
RSA Rivest Shamir Adleman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “Pass the Hash Attack”?

A

Hacking technique that allows the attacker to authenticate to a remote server by using the underlying Hash of a user’s password instead of requiring the associated plainest password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “Birthday Attack”?

A

Occurs when 2 different messages/passwords result in the same Hash Digest = Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List common Hashing Attacks (2)

A

Pass the Hash
Birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List techniques to increase Hash Security (4)

A

Key Stretching
Salting
Nonce
Limiting failed login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption Tools for Data Security (4)

A

TPM Trusted Platform Module
HSM Hardware Security Module
Key Management System
Secure Enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Obfuscation techniques in Data Security (3)

A

Steganography
Tokenization
Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List Cryptographic Attacks (3)

A

Downgrade Attack
Collision Attack
Quantum Computing Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definizione di Qubit

A

Un qubit è l’unità di informazione fondamentale nella computazione quantistica, analogo al bit nella computazione classica. Mentre un bit classico può essere in uno stato di 0 o 1, un qubit può esistere in una sovrapposizione quantica di entrambi gli stati contemporaneamente, grazie ai principi della meccanica quantistica. Questa caratteristica consente ai computer quantistici di elaborare informazioni in modi radicalmente diversi rispetto ai computer classici, offrendo potenziali vantaggi in termini di velocità e capacità computazionale per determinati tipi di problemi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key components of Quantitative Risk Analysis? (4)

A

Single Loss Expectancy SLE
Exposure Factor EF
Annualized Rate of Occurrence ARO
Annualized Loss Expectancy ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly