tuned
authorChristian Urban <urbanc@in.tum.de>
Tue, 09 Oct 2012 20:34:52 +0100
changeset 35 7dd341037669
parent 34 24116ce8c294
child 36 38d2f6f1c9d8
tuned
hw03.tex
slides03.tex
--- a/hw03.tex	Tue Oct 09 20:30:06 2012 +0100
+++ b/hw03.tex	Tue Oct 09 20:34:52 2012 +0100
@@ -27,7 +27,7 @@
 \item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
 bit be set? Why is this necessary?
 
-\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
+\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
 \end{enumerate}
 
 \end{document}
--- a/slides03.tex	Tue Oct 09 20:30:06 2012 +0100
+++ b/slides03.tex	Tue Oct 09 20:34:52 2012 +0100
@@ -495,7 +495,7 @@
 \frametitle{\begin{tabular}{@ {}c@ {}}Security Levels (2)\end{tabular}}
 
 \begin{itemize}
-\item Bell --- La Pudela preserves data secrecy, but not data integrity\bigskip\pause
+\item Bell --- La Padula preserves data secrecy, but not data integrity\bigskip\pause
 
 \item Biba model is for data integrity  
 
@@ -688,7 +688,7 @@
 
 {\bf How well does the security solution mitigate those risks?}\bigskip
 
-Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, itŐs no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures.
+Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, it's no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures.
 
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%