Question 2. Consider the following access control scenarios:(a). Let Alice, Bob, and Darth be three non-root users of aUNIX system. Alice owns a directory D with permissions set to 1777(in numeric mode). Bob has created a file F that is in directory D. Atsome point, Bob decides to set permissions for F to 777 (in numericmode). Darth, who wants to cause harm to Bob, decides to takeadvantage of the latter and attempts to delete file F. Can Darthsucceed in his attempt? Justify your answer.

icon
Related questions
Question

Question 2. Consider the following access control scenarios:
(a). Let Alice, Bob, and Darth be three non-root users of a
UNIX system. Alice owns a directory D with permissions set to 1777
(in numeric mode). Bob has created a file F that is in directory D. At
some point, Bob decides to set permissions for F to 777 (in numeric
mode). Darth, who wants to cause harm to Bob, decides to take
advantage of the latter and attempts to delete file F. Can Darth
succeed in his attempt? Justify your answer. 

Expert Solution
steps

Step by step

Solved in 1 steps

Blurred answer