I'm taking an introduction to security course and we're supposed to write a report about the Access Control System of the computer we use as though we were an attacker trying to break our own system....