A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.
What will be an ideal response?
Someone changes the source code before its compilation. (b) Someone patches (i.e., modifies) the binary object code while it is stored on disk before execution. (c) During execution, an outside process patches the object code.
You might also like to view...
A computer can have a permanently assigned dynamic IP address.
Answer the following statement true (T) or false (F)
can be written as:
Java supports type inferencing with the <> notation in statements that declare and create generic type variables and objects. For example, the following line:
List
Which class of IP addresses are used for multicast communications, in which a single address may be associated with more than one network host machine?
A. Class A B. Class B C. Class C D. Class D
What protocol is used to translate MAC layer addresses into numeric IP addresses?
A. ARP B. RARP C. RIP D. IP