handouts/ho01.tex
changeset 168 793ae8926a97
parent 167 d8657ff8cca1
child 169 2866fae8c1cf
equal deleted inserted replaced
167:d8657ff8cca1 168:793ae8926a97
    33 itself. You have to look at everything backwards, upside down,
    33 itself. You have to look at everything backwards, upside down,
    34 and sideways. You have to think like an alien.''
    34 and sideways. You have to think like an alien.''
    35 \end{quote}
    35 \end{quote}
    36 
    36 
    37 \noindent In this module I like to teach you this security
    37 \noindent In this module I like to teach you this security
    38 mindset. This might be a mindset that you think is very
    38 mindset. This might be a mindset that you think is very foreign to you
    39 foreign to you (after all we are all good citizens). I beg to
    39 (after all we are all good citizens and not ahck into things). I beg
    40 differ: You have this mindset already when in school you were
    40 to differ: You have this mindset already when in school you were
    41 thinking, at least hypothetically, in which ways you can cheat
    41 thinking, at least hypothetically, in which ways you can cheat in an
    42 in an exam (whether it is about hiding notes or looking over
    42 exam (whether it is about hiding notes or looking over the shoulders
    43 the shoulders of your fellow pupils). Right? To defend a
    43 of your fellow pupils). Right? To defend a system, you need to have
    44 system, you need to have this kind mindset and be able to
    44 this kind mindset and be able to think like an attacker. This will
    45 think like an attacker. This will include understanding
    45 include understanding techniques that can be used to compromise
    46 techniques that can be used to compromise security and privacy
    46 security and privacy in systems. This will many times result in
    47 in systems. This will many times result in insights where
    47 insights where well-intended security mechanism made a system actually
    48 well-intended security mechanism made a system actually less
    48 less secure.\smallskip
    49 secure.\smallskip 
       
    50 
    49 
    51 {\Large\bf Warning!} However, don’t be evil! Using those
    50 {\Large\bf Warning!} However, don’t be evil! Using those
    52 techniques in the real world may violate the law or King’s
    51 techniques in the real world may violate the law or King’s
    53 rules, and it may be unethical. Under some circumstances, even
    52 rules, and it may be unethical. Under some circumstances, even
    54 probing for weaknesses of a system may result in severe
    53 probing for weaknesses of a system may result in severe