equal
deleted
inserted
replaced
16 \item[(a)] Alice wants to have her files readable, except for her office mates. |
16 \item[(a)] Alice wants to have her files readable, except for her office mates. |
17 \item[(b)] Bob and Sam want to share some secret files. |
17 \item[(b)] Bob and Sam want to share some secret files. |
18 \item[(c)] Root wants some of her files to be public. |
18 \item[(c)] Root wants some of her files to be public. |
19 \end{itemize} |
19 \end{itemize} |
20 |
20 |
21 \item What should be the architecture of a network application under Unix |
21 \item What should the architecture of a network application under Unix |
22 be that processes potentially hostile data? |
22 be that processes potentially hostile data? |
23 |
23 |
24 \item How can you exploit the fact that every night root has a cron |
24 \item How can you exploit the fact that every night root has a cron |
25 job that delete the files in \texttt{/tmp}? |
25 job that deletes the files in \texttt{/tmp}? |
26 |
26 |
27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid} |
27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid} |
28 bit be set? Why is this necessary? |
28 bit set? Why is this necessary? |
29 |
29 |
30 \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure? |
30 \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure? |
31 \end{enumerate} |
31 \end{enumerate} |
32 |
32 |
33 \end{document} |
33 \end{document} |