A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly
restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.
What will be an ideal response?
(a)
Someone
changes
the
source
code
before
its
compilation.
(b)
Someone
patches
(i.e.,
modifies)
the
binary
object
code
while
it
is
stored
on
disk
before
execution.
(c)
During
execution,
an
outside
process
patches
the
object
code.
You might also like to view...
What is the first step in opening a new template in PowerPoint?
A) Click the File tab B) Click the Home tab C) Quick Access Toolbar D) Click the Open button on the Quick Access Toolbar
The ____ keyword must be used to declare a local variable.
A. local B. function C. var D. return
The Quick Access Toolbar is only visible under some Ribbon tabs.
Answer the following statement true (T) or false (F)
In C++, ____ is called the address of operator.
A. & B. * C. # D. ->