A university uses a computer system to manage its records ofstudents’ course grades. As though you were a consultant to theuniversity, describe three different types of attacks that might bemade against such a system, and recommend countermeasures that theuniversity should take against these attacks.
(Computer Security II)
Answer