[successivo]
[precedente]
[inizio]
[fine]
[indice generale]
[indice ridotto]
[violazione licenza]
[translators]
[docinfo]
[indice analitico]
[volume]
[parte]
Capitolo 733. Informazioni riservate e certificate
733.1
Crittografia
733.1.1)
Definire brevemente la crittografia simmetrica o «a chiave segreta».
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.1.2)
Definire brevemente la crittografia asimmetrica o «a chiave pubblica».
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.1.3)
Descrivere brevemente il principio di funzionamento della firma elettronica.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.1.4)
Definire brevemente cos'e un certificato elettronico in generale.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.1.5)
Cosa si deve fare quando si perde la propria chiave privata o quando si sospetta che questa sia stata trafugata?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.2
Autorità di certificazione
733.2.1)
Cosa fa l'autorità di certificazione?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.2.2)
Nel contesto specifico del problema dell'autorità di certificazione, cos'è un certificato?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.2.3)
L'autorità di certificazione, per poter rilasciare un certificato, deve disporre della chiave privata di chi richiede la certificazione? Perché?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.2.4)
L'autorità di certificazione, per poter rilasciare un certificato, deve disporre della propria chiave privata? Perché?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.2.5)
Cos'è e cosa contiene una richiesta di certificato?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.3
Connessioni cifrate e certificate
733.3.1)
Descrivere brevemente a cosa serve una connessione cifrata e certificata.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
733.3.2)
A livello di TCP/IP, qual è la difficoltà nella realizzazione di tunnel cifrati?
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
|
|
Appunti di informatica libera 2006.01.01 --- Copyright © 2000-2006 Daniele Giacomini -- <daniele (ad) swlibero·org>, <daniele·giacomini (ad) poste·it>
Dovrebbe essere possibile fare riferimento a questa pagina anche con il nome informazioni_riservate_e_certificate.htm
[successivo]
[precedente]
[inizio]
[fine]
[indice generale]
[indice ridotto]
[violazione licenza]
[translators]
[docinfo]
[indice analitico]

