hw04.tex
changeset 39 09130eb5a9b6
child 40 11681bbf0e01
equal deleted inserted replaced
38:2f2693a22626 39:09130eb5a9b6
       
     1 \documentclass{article}
       
     2 \usepackage{charter}
       
     3 \usepackage{hyperref}
       
     4 
       
     5 \begin{document}
       
     6 
       
     7 \section*{Homework 4}
       
     8 
       
     9 \begin{enumerate}
       
    10 \item What does the principle of least privilege say?
       
    11 
       
    12 \item In which of the following situations can the access control mechanism of Unix
       
    13 file permissions be used?
       
    14 
       
    15 \begin{itemize}
       
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
       
    17 \item[(b)] Bob and Sam want to share some secret files.
       
    18 \item[(c)] Root wants some of her files to be public.
       
    19 \end{itemize}
       
    20 
       
    21 \item What should the architecture of a network application under Unix 
       
    22 be that processes potentially hostile data?
       
    23 
       
    24 \item How can you exploit the fact that every night root has a cron
       
    25 job that deletes the files in \texttt{/tmp}?
       
    26 
       
    27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
       
    28 bit set? Why is this necessary?
       
    29 
       
    30 \item (Optional) Imagine you want to atack a 
       
    31 \end{enumerate}
       
    32 
       
    33 \end{document}
       
    34 
       
    35 %%% Local Variables: 
       
    36 %%% mode: latex
       
    37 %%% TeX-master: t
       
    38 %%% End: