38 the car ``responds'' by flashing the indicator lights. Can you think |
38 the car ``responds'' by flashing the indicator lights. Can you think |
39 of a security relevant purpose for that? (Hint: Imagine you are in |
39 of a security relevant purpose for that? (Hint: Imagine you are in |
40 the business of stealing cars. What attack would be easier to |
40 the business of stealing cars. What attack would be easier to |
41 perform if the lights do not flash?) |
41 perform if the lights do not flash?) |
42 |
42 |
|
43 \item Imagine you are at your home a broadband contract with |
|
44 TalkTalk. You do not like their service and want to |
|
45 switch, say, to ???. The procedure between the Internet |
|
46 providers is that you contact ??? and set up a new |
|
47 contract and they will automatically inform TalkTalk to |
|
48 terminate the old contract. TalkTalk will then send you |
|
49 a letter to confirm that you want to terminate. If they |
|
50 do not hear from you otherwise, they will terminate the |
|
51 contract and will request any outstanding cancellation |
|
52 fees. Can you imagine in which situations this way of |
|
53 doing things can cause you a lot of headaches? For this |
|
54 consider that TalkTalk needs approximately 14 days to |
|
55 reconnect you. |
|
56 |
|
57 \item A water company has a device that transmits the meter |
|
58 reading when their company car drives by. How can this |
|
59 transmitted data be abused, if not properly encrypted? |
|
60 If you identified an abuse, then how would you |
|
61 encrypt the data so that such an abuse is prevented. |
|
62 |
43 %\item Imagine there was recently a break in where computer criminals |
63 %\item Imagine there was recently a break in where computer criminals |
44 % stole a large password database containing |
64 % stole a large password database containing |
45 |
65 |
46 \item Explain what hashes and salts are. Describe how they can be used |
66 \item Explain what hashes and salts are. Describe how they can be used |
47 for ensuring data integrity and storing password information. |
67 for ensuring data integrity and storing password information. |