hw03.tex
changeset 38 2f2693a22626
parent 35 7dd341037669
child 39 09130eb5a9b6
equal deleted inserted replaced
37:31e879c6cbc1 38:2f2693a22626
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
    17 \item[(b)] Bob and Sam want to share some secret files.
    17 \item[(b)] Bob and Sam want to share some secret files.
    18 \item[(c)] Root wants some of her files to be public.
    18 \item[(c)] Root wants some of her files to be public.
    19 \end{itemize}
    19 \end{itemize}
    20 
    20 
    21 \item What should be the architecture of a network application under Unix 
    21 \item What should the architecture of a network application under Unix 
    22 be that processes potentially hostile data?
    22 be that processes potentially hostile data?
    23 
    23 
    24 \item How can you exploit the fact that every night root has a cron
    24 \item How can you exploit the fact that every night root has a cron
    25 job that delete the files in \texttt{/tmp}?
    25 job that deletes the files in \texttt{/tmp}?
    26 
    26 
    27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
    27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
    28 bit be set? Why is this necessary?
    28 bit set? Why is this necessary?
    29 
    29 
    30 \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
    30 \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
    31 \end{enumerate}
    31 \end{enumerate}
    32 
    32 
    33 \end{document}
    33 \end{document}