Alice’s computer was infected by Virus X, which attached itself to all of her applications. Bob lent her a file-searching utility, which was stored on a USB stick. This utility, however, was infected by Virus Y, which then infected all of Alice’s applications, too. Thus, each application contained two virus infections. Draw a diagram based on Figure 3.7 to show both infections in a single application file. Riko is writing a program. Bob’s computer contains a compiler that will take Riko’s source code (the program she’s written) and produce an executable program file (with an “.exe” suffix). Thus, we have three users of interest: Bob, Riko, and Suitemates, and these files: the compiler, Riko’s written program, and the executable program built by the compiler. We need to implement the policy in Table 3.8. Answer the following questions based on the scenario just described.
TABLE 3.7
Alice’s computer was infected by Virus X, which attached itself to all of her applications. Bob lent her a file-searching utility, which was stored on a USB stick. This utility, however, was infected by Virus Y, which then infected all of Alice’s applications, too. Thus, each application contained two virus infections. Draw a diagram based on Figure 3.7 to show both infections in a single application file. Riko is writing a program. Bob’s computer contains a compiler that will take Riko’s source code (the program she’s written) and produce an executable program file (with an “.exe” suffix). Thus, we have three users of interest: Bob, Riko, and Suitemates, and these files: the compiler, Riko’s written program, and the executable program built by the compiler. We need to implement the policy in Table 3.8. Answer the following questions based on the scenario just described. TABLE 3.7