hws/hw04.tex
changeset 247 95e14b2dbc94
parent 239 0db764174afb
child 250 bf4538649619
equal deleted inserted replaced
246:16cbb47ce0b9 247:95e14b2dbc94
    25 help with buffer overflow attacks?
    25 help with buffer overflow attacks?
    26 
    26 
    27 \item What does it mean that the program \texttt{passwd} has the
    27 \item What does it mean that the program \texttt{passwd} has the
    28   \texttt{setuid} bit set? Why is this necessary?
    28   \texttt{setuid} bit set? Why is this necessary?
    29 
    29 
    30 
    30 \item With which permissions does the program \texttt{login}
    31 \item In the context of which information flow should be protected, explain briefly the 
    31 normally have and why is this needed?
    32 differences between the {\it read rule} of the Bell-LaPadula access
       
    33 policy and the Biba access policy. Do the same for the {\it write rule}.
       
    34 
    32 
    35 \item A Unix directory might look as follows:
    33 \item A Unix directory might look as follows:
    36 
    34 
    37 \begin{center}
    35 \begin{center}
    38 \begin{verbatim}
    36 \begin{verbatim}
    68 bob & & & & &\\\hline
    66 bob & & & & &\\\hline
    69 emma   & & & & &\\
    67 emma   & & & & &\\
    70 \end{tabular}
    68 \end{tabular}
    71 \end{center}
    69 \end{center}
    72 
    70 
       
    71 \item In the context of which information flow should be protected, explain briefly the 
       
    72 differences between the {\it read rule} of the Bell-LaPadula access
       
    73 policy and the Biba access policy. Do the same for the {\it write rule}.
    73 
    74 
    74 \end{enumerate}
    75 \end{enumerate}
    75 
    76 
    76 
    77 
    77 \end{document}
    78 \end{document}