Changes between Version 95 and Version 96 of EducationalAssignments/SecurityLayerPartOne

Changes between Version 95 and Version 96 of EducationalAssignments/SecurityLayerPartOne

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 95 and Version 96 of EducationalAssignments/SecurityLayerPartOne

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 95 and Version 96 of EducationalAssignments/SecurityLayerPartOne

Show
Ignore:
Timestamp:
05/20/12 04:49:34 (7 years ago)
Author:
ericms
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • EducationalAssignments/SecurityLayerPartOne

    v95 v96  
    2121Three design paradigms are at work in this assignment: accuracy, efficiency, and security. 
    2222 
    23  * Accuracy: The security layer should only stop certain actions from being blocked.  All other actions should be allowed.  For example, If a user tries to write "MX" to a file this should be allowed.  As a second example "ZM" should not be blocked from the first two characters either. 
     23 * Accuracy: The security layer should only stop certain actions from being blocked.  All other actions should be allowed.  For example, If a user tries to write "MX" to a file this should be allowed.  As a second example "ZM" should be allowed as well. 
    2424 * Efficiency: The security layer should use a minimum number of resources, so performance is not compromised.   This means you should not do things like re-read the file before each write. 
    2525 * Security: The attacker should not be able to circumvent the security layer.  Hence, if "MZ" can be written two the first two characters, the security is compromised.