A student suspects there is a vulnerability on a system where student grades are stored. She tests this by trying to exploit the vulnerability from the network (because she is not authorized to use the machine and does not have an account on it). She succeeds, becoming root, and reports both the hole and her exploiting it to the system staff, who in turn report it to the chairperson of the department. She is promptly hauled before the Committee on Student Behavior on the charge of breaking into a computer system.
|You can also obtain a PDF version of this.||Version of September 22, 2016 at 7:52PM|