What are the different ways to intrude?
(a) Buffer overflows
(b) Unexpected combinations and unhandled input
(c) Race conditions
(d) All of the mentioned
This question was addressed to me during an online interview.
My question is from Security in division Security of Operating System