hws/hw01.tex
changeset 165 6f84ad98cf49
parent 97 efcac3016613
child 169 2866fae8c1cf
equal deleted inserted replaced
164:08a6e035223e 165:6f84ad98cf49
     5 \begin{document}
     5 \begin{document}
     6 
     6 
     7 \section*{Homework 1}
     7 \section*{Homework 1}
     8 
     8 
     9 \begin{enumerate}
     9 \begin{enumerate}
    10 \item {\bf (Optional)} If you want to have a look at the code presented in the lectures, install Scala available (for free) from
    10 \item {\bf (Optional)} If you want to have a look at the code
       
    11   presented in the lectures, install Node.js available (for free) from
    11 \begin{center}
    12 \begin{center}
    12 \url{http://www.scala-lang.org}
    13 \url{http://nodejs.org}
    13 \end{center}
    14 \end{center}
    14 
    15 
    15 \noindent
    16 It needs aslo the Node-packages: Express, Cookie-Parser, Body-Parser and 
    16 The web-applications from the first lecture are written in Scala using the Play Framework available (also for free) from
    17 Crypto.
    17 \begin{center}
    18 
    18 \url{http://www.playframework.org}
       
    19 \end{center}
       
    20 
    19 
    21 \item Practice thinking like an attacker. Assume the following situation:
    20 \item Practice thinking like an attacker. Assume the following situation:
    22 \begin{quote}\it
    21 \begin{quote}\it
    23 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip
    22 Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip
    24 
    23 
    30 \end{quote}
    29 \end{quote}
    31 
    30 
    32 \noindent
    31 \noindent
    33 Think of ways how you can cheat in this exam?
    32 Think of ways how you can cheat in this exam?
    34 
    33 
    35 \item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and
    34 \item Explain what hashes and salts are. Describe how they can be used
    36 storing password information.
    35   for ensuring data integrity and storing password information.
    37 
    36 
    38 \item What are good uses of cookies (that is browser cookies)?
    37 \item What are good uses of cookies (that is browser cookies)?
       
    38 
       
    39 \item Why is making bank customer be liable for financial fraud a bad
       
    40 design choice for CC payments?
    39 
    41 
    40 \end{enumerate}
    42 \end{enumerate}
    41 
    43 
    42 \end{document}
    44 \end{document}
    43 
    45