Security Objectives and Principles
CSC 213 - Operating Systems and Parallel Algorithms - Weinman
Answer the following questions. Record your answers in your Reading
Journal.
- Identify the security principle from today's reading that you
find most important. Explain an example from your own experience
that illustrates this principle.
- Identify the security principle from today's reading that is
most likely to be the weakest link in a successful password
capture attack. Briefly (3-5 sentences) explain your choice.
- You run into a local business person at a coffee shop who expresses
concern over voice mail cracking scandals.1 When he finds out you're in a computer systems class discussing security,
he confesses to the bad practice of using the same password for most
everything. How you would explain that, even if he woefully uses the
same password for his voicemail and ATM pin, a cryptographic
hash would make it impossible for even an insider at the phone company
to raid their bank account.
Footnotes:
1See e.g., this
New York Times reference.