pexels-kulbir-11079217
pexels-kulbir-11079217
pexels-kulbir-11079217
Homework Access Control Introduction to Computer Security, Matt Bishop, Chapter
Home » Internet Technology (IT)  »  Homework Access Control Introduction to Computer Security, Matt Bishop, Chapter
Homework Access Control Introduction to Computer Security, Matt Bishop, Chapter
Homework Access Control Introduction to Computer Security, Matt Bishop, Chapter 14 problems: 2, 4 1. Alice can read and write to the file A, can read the file B, and can execute the file C. Bob can read A, can read and write to B, and cannot access C. o a. Write a set of access control lists for this situation. Which list is associated with which file? 2. Explain why some UNIX-based systems with access control lists do not allow root to alter the ACL. What problems might this raise? Other questions (not from the textbook) 3. “traditional” Linux access control uses abbreviations of access control that is specified by 9 letters (e.g., rwxrwxrwx gives full access). What are the letters and what do they mean? 4. What is role-based access control? How is it different from access control based on access control lists? 5. Answer the questions on slide 28 of the power point slides, specifically, answer true or false and if false, explain why. Details are on slide 28. (You can see slide in UPLOAD FILE) i. Canexec(Ivan, code set A) = true/false ? ii. Canexec(Sam, status project A) = true/false ? iii. Canexec(Lisa, code set A) = true/false ? 6. (for help see https://github.com/bohacek/courseMaterial/raw/master/IntroToCybersecurity/WindowsACLSearch.mp4) Consider the ordered detailed access control list below. Give the end results and the steps taken in deciding the following requests made to the operating system a. Stephan is in Group A and Group B and seeks to write to the object b. Linda is in Group B and seeks to execute the object c. Joe is in Group A and seeks to read the object d. Chris is in Group C and seeks to read the object

Leave a Reply

Your email address will not be published.

Scan the code