1 \documentclass{article} |
1 \documentclass{article} |
2 \usepackage{charter} |
2 \usepackage{../style} |
3 \usepackage{hyperref} |
|
4 |
3 |
5 \begin{document} |
4 \begin{document} |
6 |
5 |
7 \section*{Homework 1} |
6 \section*{Homework 1} |
8 |
7 |
9 \begin{enumerate} |
8 \begin{enumerate} |
10 \item {\bf (Optional)} If you want to have a look at the code |
9 \item {\bf (Optional)} If you want to have a look at the code |
11 presented in the lectures, install Node.js available (for free) from |
10 presented in the lectures, install \texttt{Node.js} available (for free) from |
12 \begin{center} |
11 \begin{center} |
13 \url{http://nodejs.org} |
12 \url{http://nodejs.org} |
14 \end{center} |
13 \end{center} |
15 |
14 |
16 It needs aslo the Node-packages: Express, Cookie-Parser, Body-Parser and |
15 It needs aslo the Node-packages Express, Cookie-Parser, Body-Parser and |
17 Crypto. |
16 Crypto. They can be easily installed using the Node package manager \texttt{npm}. |
18 |
17 |
19 |
18 |
20 \item Practice thinking like an attacker. Assume the following situation: |
19 \item Practice thinking like an attacker. Assume the following situation: |
21 \begin{quote}\it |
20 |
22 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip |
21 \begin{quote}\it |
|
22 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip |
|
23 |
|
24 \noindent |
|
25 \begin{tabular}{@ {}l} |
|
26 Write the first 100 digits of pi:\\ |
|
27 3.\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ |
|
28 \end{tabular} |
|
29 \end{quote} |
23 |
30 |
24 \noindent |
31 \noindent |
25 \begin{tabular}{@ {}l} |
32 Think of ways how you can cheat in this exam? How would you defend |
26 Write the first 100 digits of pi:\\ |
33 against such cheats. |
27 3.\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ |
|
28 \end{tabular} |
|
29 \end{quote} |
|
30 |
|
31 \noindent |
|
32 Think of ways how you can cheat in this exam? |
|
33 |
34 |
34 \item Explain what hashes and salts are. Describe how they can be used |
35 \item Explain what hashes and salts are. Describe how they can be used |
35 for ensuring data integrity and storing password information. |
36 for ensuring data integrity and storing password information. |
36 |
37 |
37 \item What are good uses of cookies (that is browser cookies)? |
38 \item What are good uses of cookies (that is browser cookies)? |
38 |
39 |
39 \item Why is making bank customer be liable for financial fraud a bad |
40 \item Why is making bank customers liable for financial fraud a bad |
40 design choice for CC payments? |
41 design choice for credit card payments? |
41 |
42 |
42 \end{enumerate} |
43 \end{enumerate} |
43 |
44 |
44 \end{document} |
45 \end{document} |
45 |
46 |