[successivo]
[precedente]
[inizio]
[fine]
[indice generale]
[indice ridotto]
[translators]
[docinfo]
[indice analitico]
[volume]
[parte]
Capitolo 781. Informazioni riservate e certificate
781.1
Crittografia
781.1.1)
Definire brevemente la crittografia simmetrica o «a chiave segreta».
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.1.2)
Definire brevemente la crittografia asimmetrica o «a chiave pubblica».
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.1.3)
Descrivere brevemente il principio di funzionamento della firma elettronica.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.1.4)
Definire brevemente cos'e un certificato elettronico in generale.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.1.5)
Cosa si deve fare quando si perde la propria chiave privata o quando si sospetta che questa sia stata trafugata?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.2
Autorità di certificazione
781.2.1)
Cosa fa l'autorità di certificazione?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.2.2)
Nel contesto specifico del problema dell'autorità di certificazione, cos'è un certificato?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.2.3)
L'autorità di certificazione, per poter rilasciare un certificato, deve disporre della chiave privata di chi richiede la certificazione? Perché?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.2.4)
L'autorità di certificazione, per poter rilasciare un certificato, deve disporre della propria chiave privata? Perché?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.2.5)
Cos'è e cosa contiene una richiesta di certificato?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.3
Connessioni cifrate e certificate
781.3.1)
Descrivere brevemente a cosa serve una connessione cifrata e certificata.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
781.3.2)
A livello di TCP/IP, qual è la difficoltà nella realizzazione di tunnel cifrati?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
Appunti di informatica libera 2006.07.01 --- Copyright © 2000-2006 Daniele Giacomini -- <daniele (ad) swlibero·org>
Dovrebbe essere possibile fare riferimento a questa pagina anche con il nome informazioni_riservate_e_certificate.htm
[successivo]
[precedente]
[inizio]
[fine]
[indice generale]
[indice ridotto]
[translators]
[docinfo]
[indice analitico]