Security Mélange

CSC 213 - Operating Systems and Parallel Algorithms - Weinman



Answer the following questions. Record your answers in your Reading Journal.
  1. Identify the sentence from today's reading that best highlights the dependency of buffer-overflow attack vulnerability on system (rather than program) properties. Briefly (3-5 sentences) explain your selection.
  2. Identify the sentence from today's reading that makes the best contrast between the relative importance of an EAL and an ST. Briefly (3-5 sentences) explain your selection.
  3. Identify the security best practice you think is most likely to be overlooked, all other things being equal. Briefly (3-5 sentences) explain your selection.