hw03.tex
changeset 34 24116ce8c294
parent 33 e9288308dbcf
child 35 7dd341037669
equal deleted inserted replaced
33:e9288308dbcf 34:24116ce8c294
     7 \section*{Homework 2}
     7 \section*{Homework 2}
     8 
     8 
     9 \begin{enumerate}
     9 \begin{enumerate}
    10 \item What does the principle of least privilege say?
    10 \item What does the principle of least privilege say?
    11 
    11 
    12 \item In which situations can the access control mechanism of Unix
    12 \item In which of the following situations can the access control mechanism of Unix
    13 file permissions be used?
    13 file permissions be used?
    14 
    14 
    15 \begin{itemize}
    15 \begin{itemize}
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
    17 \item[(b)] Bob and Sam want to share some secret files.
    17 \item[(b)] Bob and Sam want to share some secret files.
    19 \end{itemize}
    19 \end{itemize}
    20 
    20 
    21 \item What should be the architecture of a network application under Unix 
    21 \item What should be the architecture of a network application under Unix 
    22 be that processes potentially hostile data?
    22 be that processes potentially hostile data?
    23 
    23 
       
    24 \item How can you exploit the fact that every night root has a cron
       
    25 job that delete the files in \texttt{/tmp}?
       
    26 
       
    27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
       
    28 bit be set? Why is this necessary?
       
    29 
    24 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
    30 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
    25 \end{enumerate}
    31 \end{enumerate}
    26 
    32 
    27 \end{document}
    33 \end{document}
    28 
    34