APPENDIX BAnswer Key

You can participate live in open dialogue online or view the videos afterward to discuss all of the exercises from this book. We don't want to leave you hanging!

Subscribe to the SheHacksPurple Newsletter for invites to the live discussions, newsletter.shehackspurple.ca, and subscribe to the SheHacksPurple YouTube channel to view the videos afterward: youtube.com/shehackspurple.

Chapter 1: Security Fundamentals

  1. Bob sets the Wi-Fi setting on his pacemaker to not broadcast the name of his Wi-Fi. What is this defensive strategy called?

    Security by obscurity

  2. Name an example of a value that could be hardcoded and why. (What would be the motivation for the programmer to do that?)

    Back in the day, the author used to hardcode connection strings for dev, QA, and prod environments so she could switch them when testing. She had no idea the security problems she caused as a dev so many years ago.

  3. Is a captcha usable security? Why or why not?

    No, it is not. Captchas are very difficult for people who are visually disabled to use, and even for fully abled people at times. They are annoying and bothersome as well; users detest them.

  4. Give one example of a good implementation of usable security.

    The password manager called 1Password can also be used as an MFA authenticator, meaning it will generate that code you get and need to enter into a site as an MFA challenge. It automatically copies it to your clipboard as soon as you have entered your username and password, ...

Get Alice and Bob Learn Application Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.