0% found this document useful (0 votes)
294 views

HW 4

The document contains questions about common knowledge problems involving multiple children with mud on their heads, security classifications and access levels in multi-level security systems, password strength, and IPsec modes of operation. Specifically, it asks the reader to: 1) Explain scenarios where 1, 2, or k children have mud on their heads and how many times the mother must ask before they can all answer. 2) Discuss why security compartments at the unclassified level are meaningless. 3) Specify access levels for subjects with different clearances trying to access objects with different classifications. 4) Outline the conditions for reading and writing objects in a Biba integrity model system. 5) Classify proposed passwords

Uploaded by

Diénert Vieira
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
294 views

HW 4

The document contains questions about common knowledge problems involving multiple children with mud on their heads, security classifications and access levels in multi-level security systems, password strength, and IPsec modes of operation. Specifically, it asks the reader to: 1) Explain scenarios where 1, 2, or k children have mud on their heads and how many times the mother must ask before they can all answer. 2) Discuss why security compartments at the unclassified level are meaningless. 3) Specify access levels for subjects with different clearances trying to access objects with different classifications. 4) Outline the conditions for reading and writing objects in a Biba integrity model system. 5) Classify proposed passwords

Uploaded by

Diénert Vieira
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

CIS 3360 Homework 4 Due Date: November 6, 2006 Worth: 4% 1.

(5+5+10+5 = 25) Several children are playing together outside. After playing they come inside and their mother says to them, at least one of you has mud on your head. Each child can see the mud on others but cannot see his or her own forehead. She then asks the following question over and over: can you tell for sure whether or not you have mud on your head? Assuming that all of the children are intelligent, honest, and answer simultaneously, what will happen in the following three scenarios? i. Suppose that there is exactly one child with mud on their forehead. Explain why, after the mother asks the question once, the muddy child is able to answer yes and the other children cannot answer yes. ii. Suppose that there are exactly two children with mud on their forehead. Explain why, after the mother asks the question once, no child is able to answer yes. Also explain why, after the mother asks the question the second time, the children with mud on their foreheads can answer yes. iii. If there are k children who are muddy, how many times does the mom has to ask before these k children confess? iv. What is the common knowledge in this problem? 2. (10) Why is it meaningless to have compartments at the UNCLASSIFIED level (such as (UNCLASSIFIED, {NUC}) and (UNCLASSIFIED, {EUR}))? Please consult Section 5.2 from Matt Bishops Computer Security book for details. 3. (9*5 = 45) Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and the categories A, B, and C, specify what type of access (read, write, both, or neither) is allowed in each of the following situations. Assume that discretionary access controls allow anyone access unless otherwise specified. i Paul, cleared for (TOP SECRET, {A, C}), wants to access a document classified (SECRET, { B, C }). ii. Anna, cleared for (CONFIDENTIAL, {C}), wants to access a document classified (CONFIDENTIAL, {B}). iii. Jesse, cleared for (SECRET, {C}), wants to access a document classified (CONFIDENTIAL, {C}).

iv. Sammi, cleared for (TOP SECRET, {A, C}), wants to access a document classified (CONFIDENTIAL, {A}). v. Robin, who has no clearances (and so works at the UNCLASSINED level), wants to access a document classified (CONFIDENTIAL, {B}). 4. (5+5 = 10) Suppose a system implementing Bibas model used the same labels for integrity levels and categories as for security levels and categories. Under what conditions could one subject read an object? Write to an object? 5. (2.5 * 4 = 10) Classify the following proposed passwords as good choices or poor choices, and justify your reasoning. i. Mary ii. Go2work iii. Cat&dog iv. 3.1515pi 6. (5+5 = 10) What are the values of doing formal evaluation? What do you see as the drawbacks of evaluation? 7. (5+5 = 10) How many modes does IPsec has? How do we decide what mode to use?

You might also like