A program is written to compute the sum of the integers from 1 to 10. The programmer, well trained in reusability and maintainability, writes the program so that it computes the sum of the numbers from k to n. However, a team of security specialists scrutinizes the code. The team certifies that this program properly sets k to 1 and n to 10; therefore, the program is certified as being properly restricted in that it always operates on precisely the range 1 to 10. List different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

What will be an ideal response?

Someone changes the source code before its compilation. (b) Someone patches (i.e., modifies) the binary object code while it is stored on disk before execution. (c) During execution, an outside process patches the object code.

Computer Science & Information Technology

You might also like to view...

A data center is a location physically houses equipment, such as computers and servers

Indicate whether the statement is true or false

Computer Science & Information Technology

The ORDER BY clause must be added to the beginning of an SQL statement after the WHERE clause

Indicate whether the statement is true or false

Computer Science & Information Technology