Security Objectives and Principles

CSC 213 - Operating Systems and Parallel Algorithms - Weinman



Answer the following questions. Record your answers in your Reading Journal.
  1. Identify the security principle from today's reading that you find most important. Explain an example from your own experience that illustrates this principle.
  2. Identify the security principle from today's reading that is most likely to be the weakest link in a successful password capture attack. Briefly (3-5 sentences) explain your choice.
  3. You run into a local business person at a coffee shop who expresses concern over voice mail cracking scandals.1 When he finds out you're in a computer systems class discussing security, he confesses to the bad practice of using the same password for most everything. How you would explain that, even if he woefully uses the same password for his voicemail and ATM pin, a cryptographic hash would make it impossible for even an insider at the phone company to raid their bank account.

Footnotes:

1See e.g., this New York Times reference.