Outline for April 15, 2004

Reading: Robust Programming handout

Discussion Problem

You discover a security flaw in the operating system on your company's computer. The flaw enables any user to read any other user's files, regardless of their protection. You have several choices: you can keep quiet and hope no-one else discovers the flaw, or tell the company, or tell the system vendor, or announce it on the Internet.

  1. Suppose an exploitation of the vulnerability could be prevented by proper system configuration. Which of the above courses of action would you take, and why?
  2. If an exploitation of the vulnerability could be detected (but not prevented) by system administrators, how would this change your answer to question 1?
  3. Now suppose no exploitation of the vulnerability can be detected or prevented. Would this change your answer, and if so, how?

Outline for the Day

  1. Robust Programming
    1. Principles
    2. Creating, reading tickets
    3. Creating, deleting queues
    4. Adding, removing items

Here is a PDF version of this document.