hws/hw03.tex
changeset 97 efcac3016613
parent 39 09130eb5a9b6
child 110 fefd78525434
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/hws/hw03.tex	Mon Sep 23 17:39:31 2013 +0100
@@ -0,0 +1,38 @@
+\documentclass{article}
+\usepackage{charter}
+\usepackage{hyperref}
+
+\begin{document}
+
+\section*{Homework 3}
+
+\begin{enumerate}
+\item What does the principle of least privilege say?
+
+\item In which of the following situations can the access control mechanism of Unix
+file permissions be used?
+
+\begin{itemize}
+\item[(a)] Alice wants to have her files readable, except for her office mates.
+\item[(b)] Bob and Sam want to share some secret files.
+\item[(c)] Root wants some of her files to be public.
+\end{itemize}
+
+\item What should the architecture of a network application under Unix 
+be that processes potentially hostile data?
+
+\item How can you exploit the fact that every night root has a cron
+job that deletes the files in \texttt{/tmp}?
+
+\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
+bit set? Why is this necessary?
+
+\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
+\end{enumerate}
+
+\end{document}
+
+%%% Local Variables: 
+%%% mode: latex
+%%% TeX-master: t
+%%% End: