83 whether they *\emph{are}* safer. Hint: Consider how |
83 whether they *\emph{are}* safer. Hint: Consider how |
84 people arrive at such an event: within a relative short |
84 people arrive at such an event: within a relative short |
85 amount of time, thousands, if not more, spectators will |
85 amount of time, thousands, if not more, spectators will |
86 arrive at your football game. |
86 arrive at your football game. |
87 |
87 |
|
88 %% CYA security - cover-your-ass |
|
89 % It's an attitude I've seen before: "Something must |
|
90 % be done. This is something. Therefore, we must do it." |
|
91 % Never mind if the something makes any sense or not. |
|
92 |
|
93 \item And another one: Imagine you are researching security |
|
94 products (e.g.~CCTV, alarms etc) on a |
|
95 helpful website. They ask you for you address details? |
|
96 Think about whether this can be bad for you. |
|
97 |
|
98 |
88 %\item Imagine there was recently a break in where computer criminals |
99 %\item Imagine there was recently a break in where computer criminals |
89 % stole a large password database containing |
100 % stole a large password database containing |
90 |
101 |
91 \item Explain what hashes and salts are. Describe how they can be used |
102 \item Explain what hashes and salts are. Describe how they can be used |
92 for ensuring data integrity and storing password information. |
103 for ensuring data integrity and storing password information. |