hw03.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Sun, 22 Sep 2013 15:23:08 +0100
changeset 92 af1aeec504cb
parent 39 09130eb5a9b6
permissions -rw-r--r--
some updates
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     1
\documentclass{article}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     2
\usepackage{charter}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     3
\usepackage{hyperref}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     4
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     5
\begin{document}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     6
39
Christian Urban <urbanc@in.tum.de>
parents: 38
diff changeset
     7
\section*{Homework 3}
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     8
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     9
\begin{enumerate}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    10
\item What does the principle of least privilege say?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    11
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    12
\item In which of the following situations can the access control mechanism of Unix
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    13
file permissions be used?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    14
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    15
\begin{itemize}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    16
\item[(a)] Alice wants to have her files readable, except for her office mates.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    17
\item[(b)] Bob and Sam want to share some secret files.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    18
\item[(c)] Root wants some of her files to be public.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    19
\end{itemize}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    20
38
Christian Urban <urbanc@in.tum.de>
parents: 35
diff changeset
    21
\item What should the architecture of a network application under Unix 
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    22
be that processes potentially hostile data?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    23
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    24
\item How can you exploit the fact that every night root has a cron
38
Christian Urban <urbanc@in.tum.de>
parents: 35
diff changeset
    25
job that deletes the files in \texttt{/tmp}?
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    26
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    27
\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
38
Christian Urban <urbanc@in.tum.de>
parents: 35
diff changeset
    28
bit set? Why is this necessary?
34
Christian Urban <urbanc@in.tum.de>
parents: 33
diff changeset
    29
35
Christian Urban <urbanc@in.tum.de>
parents: 34
diff changeset
    30
\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
33
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    31
\end{enumerate}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    32
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    33
\end{document}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    34
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    35
%%% Local Variables: 
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    36
%%% mode: latex
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    37
%%% TeX-master: t
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    38
%%% End: