What is a user permitted to do in a computer or a network if they have authorized access to under the “security testing” exception to copyright law and what permissions must the user have before undertaking security testing?
Provide at least three examples of cybercrimes that can be committed under the category of “computers as storage devices.”