hws/hw01.tex
changeset 370 ddac52c0014c
parent 350 54d6fc856950
child 371 690d778b9127
equal deleted inserted replaced
369:6c7996b6b471 370:ddac52c0014c
    38   the car ``responds'' by flashing the indicator lights. Can you think
    38   the car ``responds'' by flashing the indicator lights. Can you think
    39   of a security relevant purpose for that? (Hint: Imagine you are in
    39   of a security relevant purpose for that? (Hint: Imagine you are in
    40   the business of stealing cars. What attack would be easier to
    40   the business of stealing cars. What attack would be easier to
    41   perform if the lights do not flash?)
    41   perform if the lights do not flash?)
    42 
    42 
       
    43 \item Imagine you are at your home a broadband contract with
       
    44       TalkTalk. You do not like their service and want to
       
    45       switch, say, to ???. The procedure between the Internet
       
    46       providers is that you contact ??? and set up a new
       
    47       contract and they will automatically inform TalkTalk to
       
    48       terminate the old contract. TalkTalk will then send you
       
    49       a letter to confirm that you want to terminate. If they
       
    50       do not hear from you otherwise, they will terminate the
       
    51       contract and will request any outstanding cancellation
       
    52       fees. Can you imagine in which situations this way of
       
    53       doing things can cause you a lot of headaches? For this
       
    54       consider that TalkTalk needs approximately 14 days to
       
    55       reconnect you.
       
    56       
       
    57 \item A water company has a device that transmits the meter
       
    58       reading when their company car drives by. How can this 
       
    59       transmitted data be abused, if not properly encrypted?      
       
    60       If you identified an abuse, then how would you 
       
    61       encrypt the data so that such an abuse is prevented.
       
    62 
    43 %\item Imagine there was recently a break in where computer criminals
    63 %\item Imagine there was recently a break in where computer criminals
    44 %  stole a large password database containing 
    64 %  stole a large password database containing 
    45 
    65 
    46 \item Explain what hashes and salts are. Describe how they can be used
    66 \item Explain what hashes and salts are. Describe how they can be used
    47   for ensuring data integrity and storing password information.
    67   for ensuring data integrity and storing password information.