hws/hw01.tex
changeset 370 ddac52c0014c
parent 350 54d6fc856950
child 371 690d778b9127
--- a/hws/hw01.tex	Sat Jan 03 23:14:47 2015 +0000
+++ b/hws/hw01.tex	Sun Mar 01 00:11:13 2015 +0000
@@ -40,6 +40,26 @@
   the business of stealing cars. What attack would be easier to
   perform if the lights do not flash?)
 
+\item Imagine you are at your home a broadband contract with
+      TalkTalk. You do not like their service and want to
+      switch, say, to ???. The procedure between the Internet
+      providers is that you contact ??? and set up a new
+      contract and they will automatically inform TalkTalk to
+      terminate the old contract. TalkTalk will then send you
+      a letter to confirm that you want to terminate. If they
+      do not hear from you otherwise, they will terminate the
+      contract and will request any outstanding cancellation
+      fees. Can you imagine in which situations this way of
+      doing things can cause you a lot of headaches? For this
+      consider that TalkTalk needs approximately 14 days to
+      reconnect you.
+      
+\item A water company has a device that transmits the meter
+      reading when their company car drives by. How can this 
+      transmitted data be abused, if not properly encrypted?      
+      If you identified an abuse, then how would you 
+      encrypt the data so that such an abuse is prevented.
+
 %\item Imagine there was recently a break in where computer criminals
 %  stole a large password database containing