A student suspects there is a vulnerability on a system where student grades are stored. She tests this by trying to exploit the vulnerability from the network (because she is not authorized to use the machine and does not have an account on it). She succeeds, becoming root>, and reports both the hole and her exploiting it to the system staff, who in turn report it to the chairperson of the department. She is promptly hauled before the Committee on Student Support on the charge of breaking into a computer system.
|
ECS 153, Computer Security Version of September 24, 2019 at 4:47PM
|
You can also obtain a PDF version of this. |