Security Mélange
CSC 213 - Operating Systems and Parallel Algorithms - Weinman
Answer the following questions. Record your answers in your Reading
Journal.
- Identify the sentence from today's reading that best highlights
the dependency of buffer-overflow attack vulnerability on system
(rather than program) properties. Briefly (3-5 sentences) explain
your selection.
- Identify the sentence from today's reading that makes the best
contrast between the relative importance of an EAL and an
ST. Briefly (3-5 sentences) explain your selection.
- Identify the security best practice you think is most
likely to be overlooked, all other things being equal. Briefly (3-5
sentences) explain your selection.