Kapitel 0: Recap Flashcards

1
Q

Mögliche Angriffsarten/Bedrohungen

A

Sniffing, Spoofing, MitM, DoS, Buffer-Overflow, Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetrische Verschlüsselungsarten

A

RSA, ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetrische Verschlüsselungsarten

A

AES, ChaCha20, AEAD, 3DES, A5, Kasumi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Schlüsselverteilung

A

DH/ECDH, TTP, Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Signatur/Zertifikat

A

ECDSA, X509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kryptografische Hashfunktion

A

HMAC-SHA1, SHA2, SHA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zufallszahlengeneratoren

A

Nonce, RNG, CSPRNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentifizierung

A

Wissen (PW), Besitz (Key), Biometrie (Fingerabdruck)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zugriffskontrolle

A

ACl, Labeling, Rechtemanagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kernschutzziele:

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Confidentiality

A

Keine unautorisierte Informationsgewinnung

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity

A

Keine unbemerkte, unautorisierte Datenmanipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Availability

A

Keine unautorisierte Verhinderung der Nutzung

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authenticity

A

Nachweis der behaupteten Identität

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Accountability/Non-Repudiation

A

Keine Abstreitbarkeit durchgeführter Aktionen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privacy

A

Schutz personenbezogener Daten