hws/hw03.tex
changeset 97 efcac3016613
parent 39 09130eb5a9b6
child 110 fefd78525434
equal deleted inserted replaced
96:e1e314c1bb61 97:efcac3016613
       
     1 \documentclass{article}
       
     2 \usepackage{charter}
       
     3 \usepackage{hyperref}
       
     4 
       
     5 \begin{document}
       
     6 
       
     7 \section*{Homework 3}
       
     8 
       
     9 \begin{enumerate}
       
    10 \item What does the principle of least privilege say?
       
    11 
       
    12 \item In which of the following situations can the access control mechanism of Unix
       
    13 file permissions be used?
       
    14 
       
    15 \begin{itemize}
       
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
       
    17 \item[(b)] Bob and Sam want to share some secret files.
       
    18 \item[(c)] Root wants some of her files to be public.
       
    19 \end{itemize}
       
    20 
       
    21 \item What should the architecture of a network application under Unix 
       
    22 be that processes potentially hostile data?
       
    23 
       
    24 \item How can you exploit the fact that every night root has a cron
       
    25 job that deletes the files in \texttt{/tmp}?
       
    26 
       
    27 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
       
    28 bit set? Why is this necessary?
       
    29 
       
    30 \item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
       
    31 \end{enumerate}
       
    32 
       
    33 \end{document}
       
    34 
       
    35 %%% Local Variables: 
       
    36 %%% mode: latex
       
    37 %%% TeX-master: t
       
    38 %%% End: