equal
deleted
inserted
replaced
102 \item Explain what hashes and salts are. Describe how they can be used |
102 \item Explain what hashes and salts are. Describe how they can be used |
103 for ensuring data integrity and storing password information. |
103 for ensuring data integrity and storing password information. |
104 |
104 |
105 \item What is the difference between a brute force attack and a |
105 \item What is the difference between a brute force attack and a |
106 dictionary attack on passwords? |
106 dictionary attack on passwords? |
|
107 |
|
108 \item Even good passwords consisting of 8 characters, can be |
|
109 broken in around 50 days (obviously this time varies a lot and |
|
110 also gets shorterand shorter). Do you think it is good |
|
111 policy to require users to change their password every 3 |
|
112 months (as King's did until recently)? Under which |
|
113 circumstance should users be required to change their |
|
114 password? |
107 |
115 |
108 \item What are good uses of cookies (that is browser cookies)? |
116 \item What are good uses of cookies (that is browser cookies)? |
109 |
117 |
110 \item Why is making bank customers liable for financial fraud a bad |
118 \item Why is making bank customers liable for financial fraud a bad |
111 design choice for credit card payments? |
119 design choice for credit card payments? |