12.02.2014 Views

Lectures for 2008 - KTH

Lectures for 2008 - KTH

Lectures for 2008 - KTH

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

KURSKOMPENDIUM NÄTVERKSSÄKERHETSKURS<br />

___________________________________________________________________________<br />

Dynamic Host Configuration Protocol, 124<br />

E<br />

ECC-krypto, 85<br />

ECHELON, 31<br />

elektromagnetisk puls, 129<br />

elektroniska signaturer, 87<br />

Ellis, James H., 85<br />

EMP. Se elektromagnetisk puls<br />

Encapsulating Security Payload, 106<br />

ESP. Se Encapsulating Security Payload<br />

exploits, 28<br />

F<br />

Feistel, Horst, 78<br />

FHSS. Se Frequency Hopping Spread Spectrum<br />

Egressfiltrering<br />

Egress-, 64<br />

Ingressfiltrering<br />

Ingress-, 64<br />

Forcering. Se Kryptoanalys<br />

<strong>for</strong>mgivningsfel, 43<br />

Frequency Hopping Spread Spectrum, 121<br />

full disclosure. Se fullständig öppenhet<br />

fullständig öppenhet, 29<br />

Fulregistreringar, 119<br />

fuzzing, 40<br />

Fysisk säkerhet, 9<br />

Förtroendenätverk, 87<br />

G<br />

GCHQ. Se Government Communications Headquarters,<br />

85<br />

Geheime Kabinets-Kanzlei, 18<br />

Generic Security Services Application Programming<br />

Interface, 104<br />

Government Code and Cypher School, 76<br />

Government Communications Headquarters, 85<br />

G-skrivaren, 77<br />

GSSAPI. Se Generic Security Services Application<br />

Programming Interface<br />

H<br />

Ha9ing, 43<br />

Hack, 25<br />

Hacker, 25<br />

Hackeretik, 25<br />

Heimdal, 105<br />

Hellman, Martin, 83<br />

Herodotus, 18<br />

HMAC, 87<br />

Hot<br />

Avsiktligt, 21<br />

Oavsiktliga, 22<br />

Hotbild, 22<br />

Hotmodellering, 23<br />

härdning, 42<br />

I<br />

IDEA. Se International Data Encryption Algorithm<br />

IEEE<br />

802.11, 121<br />

802.11a, 121<br />

802.11b, 121<br />

802.11i, 122<br />

802.1q, 62<br />

802.1x, 71<br />

IKE. Se Internet Key Exchange<br />

Improved Proposed Encryption Standard, 83<br />

in<strong>for</strong>mationskrigsföring. Se in<strong>for</strong>mationsoperationer<br />

In<strong>for</strong>mationsoperationer, 132<br />

in<strong>for</strong>mationssamhället, 8<br />

initial sequence number, 27<br />

Insynsskydd. Se Sekretess<br />

International Data Encryption Algorithm, 83<br />

Internet Key Exchange, 108<br />

Intrång<br />

förstörande, 33<br />

icke-förstörande, 33<br />

IP masquerading, 71<br />

IPES. Se Improved Proposed Encryption Standard<br />

IPSec, 106<br />

IP-splicing. Se övertagande av etablerad session<br />

ISN. Se initial sequence number<br />

J<br />

julgranspaket, 27<br />

K<br />

kapplöpningsföreteelse, 36<br />

Kashpureff, Eugene, 118<br />

KaZaA, 134<br />

KDC. Se Key Distribution Center<br />

Kerberos, 103<br />

Heimdal, 105<br />

MIT, 105<br />

Version fem, 105<br />

Version fyra, 105<br />

Kerberosbiljett, 103<br />

Kerckhoffs, Auguste, 90<br />

Key Distribution Center, 103<br />

kismac, 122<br />

Klartext, 74<br />

Koch, Hugo Alexander, 76<br />

komplexitet, 42<br />

Kondensat. Se Hashvärde<br />

Konfidentialitet. Se Sekretess<br />

Kriminella hot, 48<br />

Kryptering, 74<br />

kryptoacceleratorer, 92<br />

Kryptoanalys, 74<br />

Kryptografi, 74<br />

Kryptografiskt starka kontrollsummor, 86<br />

Kryptologi, 74<br />

Kryptosystem, 74<br />

Kryptotext, 74<br />

Kryptovirologi, 58<br />

L<br />

Lai, Xuejia, 83<br />

leveransåtaganden, 47<br />

Logisk bomb, 54<br />

Logisk säkerhet, 9<br />

logisk åtkomstkontroll, 71<br />

Copyright (c) 2003-<strong>2008</strong> Robert Malmgren AB. All rights reserved Sid 137 (139)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!