An instructor in a computer security class wishes to give her students a structured penetration exercise. The students will analyze the system from manuals and through regular use, hypothesis flaws, and test them. If the flaw exists, they will then analyze why the flaw occurred, how it might be corrected, and attempt to generalize it to find other flaws. Any security flaws will be reported to the manufacturer of the system.
|You can also obtain a PDF version of this.||Version of October 8, 2006 at 10:11 PM|