diff -r 98ae49ffc262 -r 62985f147c85 hws/hw01.tex --- a/hws/hw01.tex Tue Sep 26 12:03:24 2017 +0100 +++ b/hws/hw01.tex Tue Sep 26 12:10:41 2017 +0100 @@ -34,7 +34,7 @@ \noindent Think of ways how you can cheat in this exam? How would you defend -against such cheats. +against such cheats? \item Here is another puzzle where you can practice thinking like an attacker: Consider modern car keys. They @@ -53,34 +53,9 @@ by. How can this transmitted data be abused, if not properly encrypted? If you identified an abuse, then how would you encrypt the data so that such an abuse is - prevented. Hint: Consider the fact that every person + prevented? Hint: Consider the fact that every person uses approximately 120l of water every day. -%\item And another one: Nowadays everybody and their -% grandmother seems to be scared about a bomb going off at -% a big event, say a football game. To mitigate such a -% threat, you order expensive metal detectors and hire a -% security team that will staff these detectors at each -% game. Think whether people are really safer at a -% football game with metal detectors or not. Hint: People -% certainly might *\emph{feel}* safer by going through -% metal detectors, but the question is whether they -% *\emph{are}* safer. Hint: Consider how people arrive at -% such an event: within a relative short amount of time, -% thousands, if not more, spectators will arrive at your -% football game. - -%% CYA security - cover-your-ass -% It's an attitude I've seen before: "Something must -% be done. This is something. Therefore, we must do it." -% Never mind if the something makes any sense or not. - - - - -%\item Imagine there was recently a break in where computer criminals -% stole a large password database containing - \item Explain what hashes and salts are. Describe how they can be used for ensuring data integrity and storing password information.