39
|
1 |
\documentclass{article}
|
|
2 |
\usepackage{charter}
|
|
3 |
\usepackage{hyperref}
|
|
4 |
|
|
5 |
\begin{document}
|
|
6 |
|
|
7 |
\section*{Homework 4}
|
|
8 |
|
|
9 |
\begin{enumerate}
|
40
|
10 |
\item What is bad about security-by-obscurity?
|
39
|
11 |
|
|
12 |
\item In which of the following situations can the access control mechanism of Unix
|
|
13 |
file permissions be used?
|
|
14 |
|
|
15 |
\begin{itemize}
|
|
16 |
\item[(a)] Alice wants to have her files readable, except for her office mates.
|
|
17 |
\item[(b)] Bob and Sam want to share some secret files.
|
|
18 |
\item[(c)] Root wants some of her files to be public.
|
|
19 |
\end{itemize}
|
|
20 |
|
|
21 |
\item What should the architecture of a network application under Unix
|
|
22 |
be that processes potentially hostile data?
|
|
23 |
|
|
24 |
\item How can you exploit the fact that every night root has a cron
|
|
25 |
job that deletes the files in \texttt{/tmp}?
|
|
26 |
|
|
27 |
\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
|
|
28 |
bit set? Why is this necessary?
|
|
29 |
|
|
30 |
\item (Optional) Imagine you want to atack a
|
|
31 |
\end{enumerate}
|
|
32 |
|
|
33 |
\end{document}
|
|
34 |
|
|
35 |
%%% Local Variables:
|
|
36 |
%%% mode: latex
|
|
37 |
%%% TeX-master: t
|
|
38 |
%%% End:
|