diff -r e1e314c1bb61 -r efcac3016613 hws/hw03.tex --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/hws/hw03.tex Mon Sep 23 17:39:31 2013 +0100 @@ -0,0 +1,38 @@ +\documentclass{article} +\usepackage{charter} +\usepackage{hyperref} + +\begin{document} + +\section*{Homework 3} + +\begin{enumerate} +\item What does the principle of least privilege say? + +\item In which of the following situations can the access control mechanism of Unix +file permissions be used? + +\begin{itemize} +\item[(a)] Alice wants to have her files readable, except for her office mates. +\item[(b)] Bob and Sam want to share some secret files. +\item[(c)] Root wants some of her files to be public. +\end{itemize} + +\item What should the architecture of a network application under Unix +be that processes potentially hostile data? + +\item How can you exploit the fact that every night root has a cron +job that deletes the files in \texttt{/tmp}? + +\item What does it mean that the program \texttt{passwd} has the \texttt{setuid} +bit set? Why is this necessary? + +\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure? +\end{enumerate} + +\end{document} + +%%% Local Variables: +%%% mode: latex +%%% TeX-master: t +%%% End: