A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly

restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

What will be an ideal response?


(a)
Someone
changes
the
source
code
before
its
compilation.
(b)
Someone
patches
(i.e.,
modifies)
the
binary
object
code
while
it
is
stored
on
disk
before
execution.
(c)
During
execution,
an
outside
process
patches
the
object
code.

Computer Science & Information Technology

You might also like to view...

What is the first step in opening a new template in PowerPoint?

A) Click the File tab B) Click the Home tab C) Quick Access Toolbar D) Click the Open button on the Quick Access Toolbar

Computer Science & Information Technology

The ____ keyword must be used to declare a local variable.

A. local B. function C. var D. return

Computer Science & Information Technology

The Quick Access Toolbar is only visible under some Ribbon tabs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In C++, ____ is called the address of operator.

A. & B. * C. # D. ->

Computer Science & Information Technology