--- a/hws/hw01.tex Thu Jul 14 13:07:23 2016 +0100
+++ b/hws/hw01.tex Tue Jul 19 12:08:49 2016 +0100
@@ -48,25 +48,6 @@
unlocks the doors? Which threat could be thwarted
by that?
-\item And another one: Imagine you have at home a broadband
- contract with TalkTalk. You do not like their service
- and want to switch to Virgin, say. The procedure
- between the Internet providers is that you contact
- Virgin and set up a new contract and they will
- automatically inform TalkTalk to terminate the old
- contract. TalkTalk will then send you a letter to
- confirm that you want to terminate. If they do not hear
- from you, they will proceed with terminating
- the contract and will request any outstanding
- cancellation fees. Virgin on the other hand sends you a
- new router and paperwork about the new contract.
- Obviously this way of doing things is meant to make
- switching as convenient as possible. Still can
- you imagine situations in which this way of switching
- providers can cause you a lot of headaches? For
- this consider that TalkTalk needs approximately 14 days
- to reconnect you and might ask for reconnection fees.
-
\item And another one: A water company installed devices that
transmit meter readings when their company car drives
by. How can this transmitted data be abused, if not
@@ -94,10 +75,7 @@
% be done. This is something. Therefore, we must do it."
% Never mind if the something makes any sense or not.
-\item And another one: Imagine you are researching security
- products (e.g.~CCTV, alarms etc) on a helpful website.
- They ask you for your address details? Think about
- whether this can be bad for you.
+
%\item Imagine there was recently a break in where computer criminals
@@ -117,6 +95,13 @@
Under which circumstance should users be required to
change their password?
+\item The biggest dictionary for dictionary attacks I know
+ contains 15 Billion entries. If you try out all of these
+ 15 Billion entries in order to hack one password how
+ much percent of the full brute-force space did you
+ cover. For this assume passwords use 62 charcaters and
+ are typically 8 characters long.
+
\item What are good uses of cookies (that is browser cookies)?
\item Why is making bank customers liable for financial fraud a bad