equal
deleted
inserted
replaced
30 |
30 |
31 \noindent |
31 \noindent |
32 Think of ways how you can cheat in this exam? How would you defend |
32 Think of ways how you can cheat in this exam? How would you defend |
33 against such cheats. |
33 against such cheats. |
34 |
34 |
|
35 \item Here is another puzzle where you can practice thinking like an |
|
36 attacker: Consider modern car keys. They wirelessly open and close |
|
37 the central locking system of the car. Whenever you lock the car, |
|
38 the car ``responds'' by flashing the indicator lights. Can you think |
|
39 of a security relevant purpose for that? (Hint: Imagine you are in |
|
40 the business of stealing cars. What attack would be easier to |
|
41 perform if the lights do not flash?) |
|
42 |
35 \item Explain what hashes and salts are. Describe how they can be used |
43 \item Explain what hashes and salts are. Describe how they can be used |
36 for ensuring data integrity and storing password information. |
44 for ensuring data integrity and storing password information. |
37 |
45 |
38 \item What is the difference between a brute force attack and a |
46 \item What is the difference between a brute force attack and a |
39 dictionary attack on passwords? |
47 dictionary attack on passwords? |