The University of Sydney Page 182. Modification vulnerability is exploited when?1. When an unauthorized person or application gains access to restricted computer resources2. Data is accessed by hardware or software3. The data is changed in an unauthorized manner4. Computer system becomes unavailable for use
From the lecture slides W2: