hws/hw01.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Mon, 03 Nov 2014 03:22:41 +0000
changeset 276 d7109c6e721d
parent 171 6cdf4d3906e2
child 328 7ae9a893b76f
permissions -rw-r--r--
updated

\documentclass{article}
\usepackage{../style}

\begin{document}

\section*{Homework 1}

\begin{enumerate}
\item {\bf (Optional)} If you want to have a look at the code
  presented in the lectures, install \texttt{Node.js} available (for free) from
\begin{center}
\url{http://nodejs.org}
\end{center}

It needs aslo the Node-packages Express, Cookie-Parser, Body-Parser and 
Crypto. They can be easily installed using the Node package manager \texttt{npm}.


\item Practice thinking like an attacker. Assume the following situation:

  \begin{quote}\it
    Prof.~V.~Nasty gives the following final exam question (closed books, closed notes):\bigskip

    \noindent
    \begin{tabular}{@ {}l}
      Write the first 100 digits of pi:\\
      3.\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_
    \end{tabular}
  \end{quote}

\noindent
Think of ways how you can cheat in this exam? How would you defend
against such cheats.

\item Explain what hashes and salts are. Describe how they can be used
  for ensuring data integrity and storing password information.

\item What is the difference between a brute force attack and a 
  dictionary attack on passwords? 

\item What are good uses of cookies (that is browser cookies)?

\item Why is making bank customers liable for financial fraud a bad
design choice for credit card payments?

\end{enumerate}

\end{document}

%%% Local Variables: 
%%% mode: latex
%%% TeX-master: t
%%% End: