Cybersecurity: from viruses to digital signature; fpagano64@tiscali.it, luca@libanore.it;28/1/2008

From viruses to digital signature
Menaces
Virus and worm
Troian horses
Spamming
Spyware
Phishing
Safety requirements
Cryptography
Symmetric cryptography
Asymetric cryptography
The authentication
Secrecy
Key distribution
Lenght of keys
Net Security
Techniques
Security protocols
SSL
Firewall
VPN
Net dangers
Packet sniffing
Address spoofing
DOS (Denial of Service)
Digital signature