Operating System Security Exam_1
Operating System Security Exam_1
system
security
Exam_1
Q&A From The First Four Lectures
Sample A
Q1/ List five concepts that used for designing secure systems.
Answer:
Answer:
1
]\
Q3/ what is setuid bit? and what is the benefit from it?
Answer:
Q4/ if you have the following domains and objects with the
following permissions, write the Access matrix for them.
{D1, D2, D3, D4, D5} , {F1, F2, F3, F4, printer 1, printer 2}
D5 → {printer 2, print}
2
]\
Answer:
D2 write read
D3 read write
D4 read print
D5 print
3
]\
Sample B
Q1/ List the principles of protection.
Answer:
Answer:
4
]\
Answer:
5
]\
Answer:
● user1 → F3:
○ F3 Owner: User 3, Group: Group 3, Mode Bits: rwxr- --r--
○ User 1 is not the owner (User 3).
○ User 1 is in Group 3. The group permissions are --- (no
access).
○ Conclusion: User 1 has no permissions on this file.
● user1 → F2:
○ F2 Owner: User 2, Group: Group 1, Mode Bits: rw-rw-r--
○ User 1 is not the owner (User 2).
6
]\
● user2 → F4:
○ F4 Owner: User 4, Group: Group 1, Mode Bits: r--rw----
○ User 2 is not the owner (User 4).
○ User 2 is in Group 1. The group permissions are rw-
(read-write).
○ "Others" permissions are --- (no access).
○ Conclusion: User 2 can read and write to F4 (as a
member of Group 1).
● user2 → F1:
○ F1 Owner: User 1, Group: Group 3, Mode Bits: rwxr--r--
○ User 2 is not the owner (User 1).
○ User 2 is not in Group 3.
○ "Others" permissions are r-- (read-only).
○ Conclusion: User 2 can read F1 (as "other").
Summary Table:
7
]\