diff -r aebcaa545f81 -r 514485146641 hws/hw01.tex --- a/hws/hw01.tex Thu Jul 14 13:07:23 2016 +0100 +++ b/hws/hw01.tex Tue Jul 19 12:08:49 2016 +0100 @@ -48,25 +48,6 @@ unlocks the doors? Which threat could be thwarted by that? -\item And another one: Imagine you have at home a broadband - contract with TalkTalk. You do not like their service - and want to switch to Virgin, say. The procedure - between the Internet providers is that you contact - Virgin and set up a new contract and they will - automatically inform TalkTalk to terminate the old - contract. TalkTalk will then send you a letter to - confirm that you want to terminate. If they do not hear - from you, they will proceed with terminating - the contract and will request any outstanding - cancellation fees. Virgin on the other hand sends you a - new router and paperwork about the new contract. - Obviously this way of doing things is meant to make - switching as convenient as possible. Still can - you imagine situations in which this way of switching - providers can cause you a lot of headaches? For - this consider that TalkTalk needs approximately 14 days - to reconnect you and might ask for reconnection fees. - \item And another one: A water company installed devices that transmit meter readings when their company car drives by. How can this transmitted data be abused, if not @@ -94,10 +75,7 @@ % be done. This is something. Therefore, we must do it." % Never mind if the something makes any sense or not. -\item And another one: Imagine you are researching security - products (e.g.~CCTV, alarms etc) on a helpful website. - They ask you for your address details? Think about - whether this can be bad for you. + %\item Imagine there was recently a break in where computer criminals @@ -117,6 +95,13 @@ Under which circumstance should users be required to change their password? +\item The biggest dictionary for dictionary attacks I know + contains 15 Billion entries. If you try out all of these + 15 Billion entries in order to hack one password how + much percent of the full brute-force space did you + cover. For this assume passwords use 62 charcaters and + are typically 8 characters long. + \item What are good uses of cookies (that is browser cookies)? \item Why is making bank customers liable for financial fraud a bad