--- a/hw03.tex Tue Oct 09 20:30:06 2012 +0100
+++ b/hw03.tex Tue Oct 09 20:34:52 2012 +0100
@@ -27,7 +27,7 @@
\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
bit be set? Why is this necessary?
-\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
+\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure?
\end{enumerate}
\end{document}
--- a/slides03.tex Tue Oct 09 20:30:06 2012 +0100
+++ b/slides03.tex Tue Oct 09 20:34:52 2012 +0100
@@ -495,7 +495,7 @@
\frametitle{\begin{tabular}{@ {}c@ {}}Security Levels (2)\end{tabular}}
\begin{itemize}
-\item Bell --- La Pudela preserves data secrecy, but not data integrity\bigskip\pause
+\item Bell --- La Padula preserves data secrecy, but not data integrity\bigskip\pause
\item Biba model is for data integrity
@@ -688,7 +688,7 @@
{\bf How well does the security solution mitigate those risks?}\bigskip
-Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, itŐs no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures.
+Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, it's no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures.
\end{frame}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%