--- a/hws/hw01.tex Sat Jan 03 23:14:47 2015 +0000
+++ b/hws/hw01.tex Sun Mar 01 00:11:13 2015 +0000
@@ -40,6 +40,26 @@
the business of stealing cars. What attack would be easier to
perform if the lights do not flash?)
+\item Imagine you are at your home a broadband contract with
+ TalkTalk. You do not like their service and want to
+ switch, say, to ???. The procedure between the Internet
+ providers is that you contact ??? and set up a new
+ contract and they will automatically inform TalkTalk to
+ terminate the old contract. TalkTalk will then send you
+ a letter to confirm that you want to terminate. If they
+ do not hear from you otherwise, they will terminate the
+ contract and will request any outstanding cancellation
+ fees. Can you imagine in which situations this way of
+ doing things can cause you a lot of headaches? For this
+ consider that TalkTalk needs approximately 14 days to
+ reconnect you.
+
+\item A water company has a device that transmits the meter
+ reading when their company car drives by. How can this
+ transmitted data be abused, if not properly encrypted?
+ If you identified an abuse, then how would you
+ encrypt the data so that such an abuse is prevented.
+
%\item Imagine there was recently a break in where computer criminals
% stole a large password database containing