updated
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 23 Sep 2014 17:05:33 +0100
changeset 173 9126c13a7d93
parent 172 aa7ddfee35c9
child 174 e2180cead443
updated
handouts/ho01.tex
--- a/handouts/ho01.tex	Tue Sep 23 17:05:14 2014 +0100
+++ b/handouts/ho01.tex	Tue Sep 23 17:05:33 2014 +0100
@@ -79,9 +79,11 @@
 people guarding and maintaining the system have to do their job
 properly, and also the motive that the attackers have to try to defeat
 your policy). The last point is often overlooked, but plays an
-important role. Lets look at an example. The questions is whether
-the Chip-and-PIN system with credit cards is more secure than the older
-method of signing receipts at the till.
+important role. 
+
+Lets look at an example. The questions is whether the Chip-and-PIN
+system with credit cards is more secure than the older method of
+signing receipts at the till.