An instructor in a computer security class wishes to give her students a structured penetration exercise. The students will analyze the system from manuals and through regular use, hypothesis flaws, and test them. If the flaw exists, they will then analyze why the flaw occurred, how it might be corrected, and attempt to generalize it to find other flaws. Any security flaws will be reported to the manufacturer of the system.
Send email to
cs153@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562