Unformatted text preview: find the source that you used. Consider our point-of-view: we use homeworks to see if you are learning security material, not to see if you are good at searching Google. It is also a bit more serious: any failure to follow either of these guidelines is a violation of academic honesty. If you are unsure whether or not you are using outside material appropriately, please ask me rather than guessing. Provide solutions to the following six questions. 1. (10 points) Section 3.10, #4. 2. (15 points) Section 3.10, #14. 3. (20 points) Section 3.10, #15. 4. (20 points) Explain how an attacker could convert each of the following into a covert channel: (a) Spam email (b) Non-spam email (c) Images in a flickr account (d) The directory of temporary files on a system 5. (15 points) Section 9.8, #3. 6. (20 points) Section 9.8, #5....
View Full Document
- Spring '08
- Information Security, Following, E-mail, February 11