A student suspects there is a vulnerability on a system in a university public access laboratory. She tests this by trying to exploit the vulnerability. She succeeds, and obtains privileges that she would not normally have. She reports both the hole and her exploiting it to the system staff, who in turn report it to the manager of the laboratory. The manager files charges of breaking into a computer system against the student. The student is promptly hauled before the Student Judicial Authority.
ECS 153, Introduction to Computer Security|
Winter Quarter 2002