equal
deleted
inserted
replaced
25 help with buffer overflow attacks? |
25 help with buffer overflow attacks? |
26 |
26 |
27 \item What does it mean that the program \texttt{passwd} has the |
27 \item What does it mean that the program \texttt{passwd} has the |
28 \texttt{setuid} bit set? Why is this necessary? |
28 \texttt{setuid} bit set? Why is this necessary? |
29 |
29 |
30 |
30 \item With which permissions does the program \texttt{login} |
31 \item In the context of which information flow should be protected, explain briefly the |
31 normally have and why is this needed? |
32 differences between the {\it read rule} of the Bell-LaPadula access |
|
33 policy and the Biba access policy. Do the same for the {\it write rule}. |
|
34 |
32 |
35 \item A Unix directory might look as follows: |
33 \item A Unix directory might look as follows: |
36 |
34 |
37 \begin{center} |
35 \begin{center} |
38 \begin{verbatim} |
36 \begin{verbatim} |
68 bob & & & & &\\\hline |
66 bob & & & & &\\\hline |
69 emma & & & & &\\ |
67 emma & & & & &\\ |
70 \end{tabular} |
68 \end{tabular} |
71 \end{center} |
69 \end{center} |
72 |
70 |
|
71 \item In the context of which information flow should be protected, explain briefly the |
|
72 differences between the {\it read rule} of the Bell-LaPadula access |
|
73 policy and the Biba access policy. Do the same for the {\it write rule}. |
73 |
74 |
74 \end{enumerate} |
75 \end{enumerate} |
75 |
76 |
76 |
77 |
77 \end{document} |
78 \end{document} |