diff -r 6c7996b6b471 -r ddac52c0014c hws/hw01.tex --- a/hws/hw01.tex Sat Jan 03 23:14:47 2015 +0000 +++ b/hws/hw01.tex Sun Mar 01 00:11:13 2015 +0000 @@ -40,6 +40,26 @@ the business of stealing cars. What attack would be easier to perform if the lights do not flash?) +\item Imagine you are at your home a broadband contract with + TalkTalk. You do not like their service and want to + switch, say, to ???. The procedure between the Internet + providers is that you contact ??? and set up a new + contract and they will automatically inform TalkTalk to + terminate the old contract. TalkTalk will then send you + a letter to confirm that you want to terminate. If they + do not hear from you otherwise, they will terminate the + contract and will request any outstanding cancellation + fees. Can you imagine in which situations this way of + doing things can cause you a lot of headaches? For this + consider that TalkTalk needs approximately 14 days to + reconnect you. + +\item A water company has a device that transmits the meter + reading when their company car drives by. How can this + transmitted data be abused, if not properly encrypted? + If you identified an abuse, then how would you + encrypt the data so that such an abuse is prevented. + %\item Imagine there was recently a break in where computer criminals % stole a large password database containing