Appendice A. A. Elenco degli acronimi utilizzati



Similar documents
Introducing etoken. What is etoken?

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

The Encryption Technology of Automatic Teller Machine Networks

ICTTEN8195B Evaluate and apply network security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Small or Medium scale focused research project STREP MICIE

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Lecture 9 - Network Security TDTS (ht1)

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

EXAM questions for the course TTM Information Security May Part 1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Securing IP Networks with Implementation of IPv6

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security Part II: Standards

Secure Network Communications FIPS Non Proprietary Security Policy

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Lecture 10: Communications Security

CNS Carta Nazionale dei Servizi Functional Specification

CS 356 Lecture 28 Internet Authentication. Spring 2013

ETSI TS V1.2.1 ( )

Introduction to Security and PIX Firewall

CCNA Security 1.1 Instructional Resource

Communication Security for Applications

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Smart Card Technology Capabilities

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

KeyStone Architecture Security Accelerator (SA) User Guide

GlobalPlatform. Card Specification. Version 2.2

Network Security. Lecture 3

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Site to Site Virtual Private Networks (VPNs):

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

TLS/SSL in distributed systems. Eugen Babinciuc

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

How To Understand And Understand The Security Of A Key Infrastructure

CNS Carta Nazionale dei Servizi Functional Specification

Application Note: Onsight Device VPN Configuration V1.1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

IT Networks & Security CERT Luncheon Series: Cryptography

Integrated Services Router with the "AIM-VPN/SSL" Module

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

(d-5273) CCIE Security v3.0 Written Exam Topics

Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012

Security Protocols/Standards

Chapter 8. Network Security

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Standards and Products. Computer Security. Kerberos. Kerberos

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

This Working Paper provides an introduction to the web services security standards.

SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Network Security Fundamentals

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Chapter 4 Virtual Private Networking

MDG. MULTOS Developer's Guide. MAO-DOC-TEC-005 v MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited.

CS 4803 Computer and Network Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Chapter 10. Network Security

Integrated Services Router with the "AIM-VPN/SSL" Module

Chapter 8 Virtual Private Networking

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

, ) I Transport Layer Security

Netzwerksicherheit: Anwendungen

Virtual Private Networks

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne

Release: 1. ICANWK502A Implement secure encryption technologies

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Smart Card. Smart Card applications

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Data Sheet. NCP Secure Enterprise Client Windows. Next Generation Network Access Technology

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

CSCI 454/554 Computer and Network Security. Final Exam Review

IP Security. Ola Flygt Växjö University, Sweden

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

eid Security Frank Cornelis Architect eid fedict All rights reserved

The BANDIT Products in Virtual Private Networks

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

Smart Card Application Development Using Java

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Chapter 32 Internet Security

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Transcription:

A. 3DES: Triple Data Encryption Standard ABI: Associazione Bancaria Italiana AC: Access Condition AES: American Encryption Standard AH: Authentication Header AIPA: Autorità per l'informatica nella Pubblica Amministrazione APDU: Application Protocol Data Unit API: Application Program Interface ASCII: American Standard Code for Information Interchange ATM: Automatic Teller Machine ATR: Answer to Reset Tesi di Laurea di Elena Nuti 149

B: bytes B2B: Business to Business B2C: Business to Consumer BS: Base Security BSO: Base Security Object CA: Certification Authority CAPI: Microsoft CryptoAPI CBC: Cipher Block Chaining CCD: Charge Coupled Device CBEFF: Common Biometrics Exchange File Format CDSA: Common Data Security Architecture CFB: Cipher FeedBack CGI: Common Gateway Interface CIE: Carta di Identità Elettronica CLA: Byte di classificazione CNS: Carta Nazionale dei Servizi COM: Component Object Model CON: Confidentiality CPU: Central Process Unit CRL: Certificate Revocation List CRM: Customer Realationship Management CS: Centro Servizi Tesi di Laurea di Elena Nuti 150

CSP: Crypto Service Provider CSS: Current Security Status d.p.r. Decreto del Presidente della Repubblica DEC: Decryption DES: Data Encryption Standard DF: Dedicated File DH: Diffie-Hellman DS: Digital Signature DoD: Department of Defense DoS: Denial of Service EBT: Electron Beam Tester ECB: Electronic Code Book EEPROM: Electrically Erasable Programmable Read-Only Memory EER: Equal Error Rate EF: Elementary File EMS: ElectroMagnetic Analysis EMV: EuroPay, MasterCard, Visa ENC: Encryption EPROM: Erasable Programmable Read-Only Memory ESP: Encapsulating Security Payload FAR: False Acceptance Rate FCI: File Control Information Tesi di Laurea di Elena Nuti 151

FIB: Focused Ion Beam FID: File ID FIPS: Federal Information Processing Standards FRR: False Rejection Rate FS: Fornitore di Servizi GSM: Global System for Mobile Communications HTTP: Hypertext Transfer Protocol HTTPS: Secure HTTP ICC: Integrated Circuit Card IDEA: International Data Encryption Algorithm IFD: InterFace Device IKE: Internet Key Exchange INS: Byte di istruzione IP: Internet Protocol IPSec: Internet Protocol Security ISAKMP: Internet Security Association and Key Management Protocol ISO: International Organization for Standardization IT: Information Technology ITSEC: Information Technology Security Evaluation Criteria KB: Kilobytes LAN: Local Area Network Tesi di Laurea di Elena Nuti 152

LFSR: Linear FeedBack Shift Register MAC: Message Authentication Coding MHz: Megahertz MITM: Man in the middle MF: Master file o Main File MSE: Manage Security Environment NIST: National Institute of Standard and Technology NSA: National Security Agency OCI: Informazione di controllo oggetti OCF: OpenCard Framework OFB: Output FeedBack OI: Order Info OS: Operating System OSI: Open Systems Interconnected PC: Personal Computer PCBC: Propagating Cipher Block Chaining PC/SC: Personal Computer/Smart Card PGP: Pretty Good Privacy PI: Payment Instruction PIN: Personal identification Number PKCS: Public Key Cryptographic System PKI: Public Key Infrastructure Tesi di Laurea di Elena Nuti 153

POS: Point of Sale PSO: Perform Security Operation PSTN: Public Switched Telephone Network PUK: PIN Unblocking Key PVC: Poly Vinyl Chloride RAM: Random Access Memory RCn: algoritmo Rivest Code numero n RF: Radio Frequenza ROM: Read-Only Memory RSA: algoritmo Rivest-Shamir-Adelman SA: Security Association SAM: Security Application Module SC: Smart Card SCSUG: Smart Card Security User Group SE: Secure Environment SEO: Secure Environment Object SET: Secure Electronic Transaction SHA: Secure Hash Algorithm SIM: Subscriber Identification Module SM: Secure Messaging SOAP: Simple Object Access Protocol SPOM -Self-Programmable One-chip Microcomputer Tesi di Laurea di Elena Nuti 154

SSB: Società per i Servizi Bancari SSL: Secure Sockets Layer STS: Station to Station Protocol SW: Software TCP/IP: Transmission Control Protocol/Internet Protocol TDES: Triple Data Encryption Standard TLV: Tag Length Value TPV: Terminali Punti Vendita TSA: TimeStamping Authority TSP: Tecnologie e Servizi per il Pubblico UDDI: Universal Description Discovery and Interrogation UMTS: Universal Mobile Telecommunications System USB: Universal Serial Bus VOP: Visa Open Platform VPN: Virtual Private Network W3C: World Wide Web Consortium WAN: Wide Area Network WS: Web Service WSD: Web Service Description WSDL: Web Service Description Language WWW: World Wide Web XML: extensible Markup Language Tesi di Laurea di Elena Nuti 155