Imagine you are the head engineer of building ATM machines for a multibillion-dollar bank (you can assume you have infinite resources).
You have been asked by the CEO to build an unhackable/unbreakable ATM?
How would you do this? What security mechanisms would you have?
How how would you attack your atm?
If anyone has any concerns or feedback for me and want to remain anonymous, they can contact the class rep who will forward the message to me.
If anyone has any concerns or feedback for the course and want to remain anonymous, they can contact the class rep who will forward the message to the course admins/lecturer via cs6441@cse.unsw.edu.au
Class rep to join case study group called "StuReps"
Liam: liam.smith@unsw.edu.au
Everyone should have received feedback for this. Most will require some slight modification of it.
But other than that, I'm super keen to start reading your blogs.
It's a good idea to write a weekly blog about what you did that week for it. That way you can show your progress.
Dealing with challenges reflection. Things to include:
All this came straight from the course outline
You are the amazing Dick Smith. Skeptic, philanthropist, all round nice guy, and former Chairman of the Civil Aviation Safety Authority Board.
In light of the German Wings incident and the earlier EgyptAir incident the Civil Aviation Safety Authority, the government statutory authority responsible for the regulation of civil aviation, has asked you to return and lead a review into physical security of airplane cockpits and controls
You have been asked to consider the main lessons that that should be learned from these and other relevant incidents and to produce a shortlist of recommendations for actions to be taken to prevent future disasters.
Your review is widely supported including by the both houses of parliament, the public, Airbus, Boing, Airservices Australia, the major airlines which fly into Australia, the Australian Federation of Air Pilots, the Australian and International Pilots Association, the AFP and ASIO. These parties are all prepared to devote considerable resources to implement your recommendations.
State and justify your top 5 recommendations. Give them in decreasing order of importance (i.e. most important first).
In making your recommendations you have been asked to consider:
Everyone to spend 5 min on their own to think about:
We will then go into groups, discuss what you have and come up with your top 5 recommendations
What are our thoughts / oppinons of the case study?
Why is this important?
How does this relate to security?