equal
deleted
inserted
replaced
7 \section*{Homework 2} |
7 \section*{Homework 2} |
8 |
8 |
9 \begin{enumerate} |
9 \begin{enumerate} |
10 \item What does the principle of least privilege say? |
10 \item What does the principle of least privilege say? |
11 |
11 |
12 \item In which situations can the access control mechanism of Unix |
12 \item In which of the following situations can the access control mechanism of Unix |
13 file permissions be used? |
13 file permissions be used? |
14 |
14 |
15 \begin{itemize} |
15 \begin{itemize} |
16 \item[(a)] Alice wants to have her files readable, except for her office mates. |
16 \item[(a)] Alice wants to have her files readable, except for her office mates. |
17 \item[(b)] Bob and Sam want to share some secret files. |
17 \item[(b)] Bob and Sam want to share some secret files. |
19 \end{itemize} |
19 \end{itemize} |
20 |
20 |
21 \item What should be the architecture of a network application under Unix |
21 \item What should be the architecture of a network application under Unix |
22 be that processes potentially hostile data? |
22 be that processes potentially hostile data? |
23 |
23 |
|
24 \item How can you exploit the fact that every night root has a cron |
|
25 job that delete the files in \texttt{/tmp}? |
|
26 |
|
27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid} |
|
28 bit be set? Why is this necessary? |
|
29 |
24 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? |
30 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? |
25 \end{enumerate} |
31 \end{enumerate} |
26 |
32 |
27 \end{document} |
33 \end{document} |
28 |
34 |