Discussion questions for Week 1 1. In the discussion on passwords in Pf/Pf Ch. 2, there is a blatant mathematical error. What is it? Does it matter to the authors' argument? 2. Search the web to see what you can discover about the rules and policies (password format, expiration rules, etc.) for passwords for the PSU Odin (university-run) computer accounts. Do these rules make sense to you? Do they strke a good balance between security and usability? 3. Suppose you receive an unsolicited DVD in the US mail, purporting to contain a free copy of some useful software. You decide to install it on your home computer. The installation requires that you log in as "administrator" or "root." Unfortunately, the DVD contains a virus that erases your hard drive. Does this sequence of events constitute a security failure? If so, who or what failed?