\documentclass{article}\usepackage{charter}\usepackage{hyperref}\begin{document}\section*{Homework 2}\begin{enumerate}\item What does the principle of least privilege say?\item In which of the following situations can the access control mechanism of Unixfile permissions be used?\begin{itemize}\item[(a)] Alice wants to have her files readable, except for her office mates.\item[(b)] Bob and Sam want to share some secret files.\item[(c)] Root wants some of her files to be public.\end{itemize}\item What should be the architecture of a network application under Unix be that processes potentially hostile data?\item How can you exploit the fact that every night root has a cronjob that delete the files in \texttt{/tmp}?\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}bit be set? Why is this necessary?\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?\end{enumerate}\end{document}%%% Local Variables: %%% mode: latex%%% TeX-master: t%%% End: