This preview shows page 1. Sign up to view the full content.
Unformatted text preview: find the source that you used. Consider our point-of-view: we use homeworks to see if you are learning security material, not to see if you are good at searching Google. It is also a bit more serious: any failure to follow either of these guidelines is a violation of academic honesty. If you are unsure whether or not you are using outside material appropriately, please ask me rather than guessing. Provide solutions to the following six questions. 1. (10 points) Section 3.10, #4. 2. (15 points) Section 3.10, #14. 3. (20 points) Section 3.10, #15. 4. (20 points) Explain how an attacker could convert each of the following into a covert channel: (a) Spam email (b) Non-spam email (c) Images in a flickr account (d) The directory of temporary files on a system 5. (15 points) Section 9.8, #3. 6. (20 points) Section 9.8, #5....
View Full Document
This note was uploaded on 04/20/2008 for the course CS 4235 taught by Professor Giffin during the Spring '08 term at Georgia Institute of Technology.
- Spring '08
- Information Security