Homework #4
UC Davis Students: Due June 6, 1997 at 5:00PM;
absolutely no extensions will be given due to the end of the term
NTU Students: Due June 13, 1997 at 5:00PM
- (40 points) (text, problem 13.8) Compare the Clark-Wilson model rules
to typical software engineering approaches for protecting abstract data types
from program routines.
- (20 points) (text, problem 16.6) Identify any potential single
points of failure in the auditing scheme depicted in Figure 16.4 of the text.
- (20 points) (text, problem 27.2, modified) Some computer security
experts claim that cryptography is all that is necessary to provide network
security. Explain why this is false; in particular, explain why encryption
protocols do not provide adequate protection in the absence of trusted hosts.
- (80 points) Suppose someone wrote a file system scanner that computed
cryptographic checksums of files, and compared them to a master list, reporting
differences. The first program scans the files, computes the checksums, and
transmits them to a second program, which compares the newly-computed checksums
to the master list and reports differences. What considerations would the
author need to take into account to make this security tool as useful as
possible? Discuss attacks and countermeasures. Note that the tool can be used
either on a single system or over a network (where the server is the second
program and the client, which resides on the system being checked, is the first
program).
You can get this document in
Postscript,
ASCII text, or
Framemaker
version 5.1.
Send email to
cs253@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 5/29/97