SlideShare a Scribd company logo
What is a buffer overflow? Briefly explain this vulnerability.Briefly explain the idea of a race
condition.Why is TOCTTOU a security issue?What is the difference between a stack and a heap
in context of computer memory?How is canary value used to prevent stack smashing
attacks?What buffer overflow attack is more difficult, heap-based or stack-based. Why?Briefly
explain two unsafe C functions that are subject to buffer overflow attack.What is a difference
between a virus and a worm?What is a difference between an encrypted worm and a
polymorphic worm?What is a virus signature?Describe a real-world example of a buffer
overflow that was exploited as part of a successful attack.Describe functionality and propagation
method of any virus not mentioned in the textbook.Describe functionality and propagation
method of any worm not mentioned in the textbook.Describe any real-world botnet, its
functionality, size, and purpose.Find a description and explain the risks of an unpatched
vulnerability in any modern browser.

More Related Content

Similar to What is a buffer overflow Briefly explain this vulnerability.Briefly .pdf

Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
Mandy Cross
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
FoCAS Initiative
 
Report_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_SpywareReport_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_SpywareShan Kumar
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flag
UIT
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
Wail Hassan
 
Computer Security
Computer SecurityComputer Security
Computer Security
William Mann
 
Malware Evasion Techniques
Malware Evasion TechniquesMalware Evasion Techniques
Malware Evasion Techniques
Thomas Roccia
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
Antonio Parata
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithmsUltraUploader
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
computer virus
computer virus computer virus
computer virus
Nourhan Markus
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And AlifeZotronix
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
Abhijeet Karve
 
APTs can you catch’em all
APTs can you catch’em allAPTs can you catch’em all
APTs can you catch’em all
ITrust - Cybersecurity as a Service
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
jyoti_lakhani
 
Task 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxTask 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docx
josies1
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zooUltraUploader
 
20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_securityComputer Science Club
 

Similar to What is a buffer overflow Briefly explain this vulnerability.Briefly .pdf (20)

Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
 
Report_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_SpywareReport_Honeypots_Trojans_Spyware
Report_Honeypots_Trojans_Spyware
 
Caputre the flag
Caputre the flagCaputre the flag
Caputre the flag
 
Module 20 (buffer overflows)
Module 20 (buffer overflows)Module 20 (buffer overflows)
Module 20 (buffer overflows)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Malware Evasion Techniques
Malware Evasion TechniquesMalware Evasion Techniques
Malware Evasion Techniques
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithms
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
computer virus
computer virus computer virus
computer virus
 
Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
APTs can you catch’em all
APTs can you catch’em allAPTs can you catch’em all
APTs can you catch’em all
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Task 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxTask 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docx
 
A short visit to the bot zoo
A short visit to the bot zooA short visit to the bot zoo
A short visit to the bot zoo
 
20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security
 

More from fashiodofashion

Using Flutter from Android StudioMake an app named �List� that act.pdf
Using Flutter from Android StudioMake an app named �List� that act.pdfUsing Flutter from Android StudioMake an app named �List� that act.pdf
Using Flutter from Android StudioMake an app named �List� that act.pdf
fashiodofashion
 
Topic The digital divide and the Elderly. Once the literature rev.pdf
Topic The digital divide and the Elderly. Once the literature rev.pdfTopic The digital divide and the Elderly. Once the literature rev.pdf
Topic The digital divide and the Elderly. Once the literature rev.pdf
fashiodofashion
 
Translating strategic corporate objectives into logistics decisions.pdf
Translating strategic corporate objectives into logistics decisions.pdfTranslating strategic corporate objectives into logistics decisions.pdf
Translating strategic corporate objectives into logistics decisions.pdf
fashiodofashion
 
Too Much Fatigue and StressJob fatigue and stress are significant.pdf
Too Much Fatigue and StressJob fatigue and stress are significant.pdfToo Much Fatigue and StressJob fatigue and stress are significant.pdf
Too Much Fatigue and StressJob fatigue and stress are significant.pdf
fashiodofashion
 
Tony visited his accountant, Alisha, to discuss his annual tax retur.pdf
Tony visited his accountant, Alisha, to discuss his annual tax retur.pdfTony visited his accountant, Alisha, to discuss his annual tax retur.pdf
Tony visited his accountant, Alisha, to discuss his annual tax retur.pdf
fashiodofashion
 
Three individuals form Bro Corporation with the following contributi.pdf
Three individuals form Bro Corporation with the following contributi.pdfThree individuals form Bro Corporation with the following contributi.pdf
Three individuals form Bro Corporation with the following contributi.pdf
fashiodofashion
 
What is the formula for the minimum variance hedge ratio when daily .pdf
What is the formula for the minimum variance hedge ratio when daily .pdfWhat is the formula for the minimum variance hedge ratio when daily .pdf
What is the formula for the minimum variance hedge ratio when daily .pdf
fashiodofashion
 
what is conflict management style and what happens to the conflict sit.pdf
what is conflict management style and what happens to the conflict sit.pdfwhat is conflict management style and what happens to the conflict sit.pdf
what is conflict management style and what happens to the conflict sit.pdf
fashiodofashion
 
What are your system boundariesWhat is (are) the major application(s).pdf
What are your system boundariesWhat is (are) the major application(s).pdfWhat are your system boundariesWhat is (are) the major application(s).pdf
What are your system boundariesWhat is (are) the major application(s).pdf
fashiodofashion
 
Wharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdf
Wharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdfWharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdf
Wharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdf
fashiodofashion
 
We have subsetted a VCF from the human genome to just variants ident.pdf
We have subsetted a VCF from the human genome to just variants ident.pdfWe have subsetted a VCF from the human genome to just variants ident.pdf
We have subsetted a VCF from the human genome to just variants ident.pdf
fashiodofashion
 
We discussed the relationship between money growth and inflation in .pdf
We discussed the relationship between money growth and inflation in .pdfWe discussed the relationship between money growth and inflation in .pdf
We discussed the relationship between money growth and inflation in .pdf
fashiodofashion
 
Value 10 Overview Write a Persuasive Message Email to Qual.pdf
Value 10 Overview Write a Persuasive Message Email to Qual.pdfValue 10 Overview Write a Persuasive Message Email to Qual.pdf
Value 10 Overview Write a Persuasive Message Email to Qual.pdf
fashiodofashion
 
Using the same Excel file, open the tab labeled �Problem 2�. Copy and .pdf
Using the same Excel file, open the tab labeled �Problem 2�. Copy and .pdfUsing the same Excel file, open the tab labeled �Problem 2�. Copy and .pdf
Using the same Excel file, open the tab labeled �Problem 2�. Copy and .pdf
fashiodofashion
 

More from fashiodofashion (14)

Using Flutter from Android StudioMake an app named �List� that act.pdf
Using Flutter from Android StudioMake an app named �List� that act.pdfUsing Flutter from Android StudioMake an app named �List� that act.pdf
Using Flutter from Android StudioMake an app named �List� that act.pdf
 
Topic The digital divide and the Elderly. Once the literature rev.pdf
Topic The digital divide and the Elderly. Once the literature rev.pdfTopic The digital divide and the Elderly. Once the literature rev.pdf
Topic The digital divide and the Elderly. Once the literature rev.pdf
 
Translating strategic corporate objectives into logistics decisions.pdf
Translating strategic corporate objectives into logistics decisions.pdfTranslating strategic corporate objectives into logistics decisions.pdf
Translating strategic corporate objectives into logistics decisions.pdf
 
Too Much Fatigue and StressJob fatigue and stress are significant.pdf
Too Much Fatigue and StressJob fatigue and stress are significant.pdfToo Much Fatigue and StressJob fatigue and stress are significant.pdf
Too Much Fatigue and StressJob fatigue and stress are significant.pdf
 
Tony visited his accountant, Alisha, to discuss his annual tax retur.pdf
Tony visited his accountant, Alisha, to discuss his annual tax retur.pdfTony visited his accountant, Alisha, to discuss his annual tax retur.pdf
Tony visited his accountant, Alisha, to discuss his annual tax retur.pdf
 
Three individuals form Bro Corporation with the following contributi.pdf
Three individuals form Bro Corporation with the following contributi.pdfThree individuals form Bro Corporation with the following contributi.pdf
Three individuals form Bro Corporation with the following contributi.pdf
 
What is the formula for the minimum variance hedge ratio when daily .pdf
What is the formula for the minimum variance hedge ratio when daily .pdfWhat is the formula for the minimum variance hedge ratio when daily .pdf
What is the formula for the minimum variance hedge ratio when daily .pdf
 
what is conflict management style and what happens to the conflict sit.pdf
what is conflict management style and what happens to the conflict sit.pdfwhat is conflict management style and what happens to the conflict sit.pdf
what is conflict management style and what happens to the conflict sit.pdf
 
What are your system boundariesWhat is (are) the major application(s).pdf
What are your system boundariesWhat is (are) the major application(s).pdfWhat are your system boundariesWhat is (are) the major application(s).pdf
What are your system boundariesWhat is (are) the major application(s).pdf
 
Wharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdf
Wharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdfWharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdf
Wharton General Hospital and Medical Center�s CFO of 20 years, Owen De.pdf
 
We have subsetted a VCF from the human genome to just variants ident.pdf
We have subsetted a VCF from the human genome to just variants ident.pdfWe have subsetted a VCF from the human genome to just variants ident.pdf
We have subsetted a VCF from the human genome to just variants ident.pdf
 
We discussed the relationship between money growth and inflation in .pdf
We discussed the relationship between money growth and inflation in .pdfWe discussed the relationship between money growth and inflation in .pdf
We discussed the relationship between money growth and inflation in .pdf
 
Value 10 Overview Write a Persuasive Message Email to Qual.pdf
Value 10 Overview Write a Persuasive Message Email to Qual.pdfValue 10 Overview Write a Persuasive Message Email to Qual.pdf
Value 10 Overview Write a Persuasive Message Email to Qual.pdf
 
Using the same Excel file, open the tab labeled �Problem 2�. Copy and .pdf
Using the same Excel file, open the tab labeled �Problem 2�. Copy and .pdfUsing the same Excel file, open the tab labeled �Problem 2�. Copy and .pdf
Using the same Excel file, open the tab labeled �Problem 2�. Copy and .pdf
 

Recently uploaded

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 

Recently uploaded (20)

1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 

What is a buffer overflow Briefly explain this vulnerability.Briefly .pdf

  • 1. What is a buffer overflow? Briefly explain this vulnerability.Briefly explain the idea of a race condition.Why is TOCTTOU a security issue?What is the difference between a stack and a heap in context of computer memory?How is canary value used to prevent stack smashing attacks?What buffer overflow attack is more difficult, heap-based or stack-based. Why?Briefly explain two unsafe C functions that are subject to buffer overflow attack.What is a difference between a virus and a worm?What is a difference between an encrypted worm and a polymorphic worm?What is a virus signature?Describe a real-world example of a buffer overflow that was exploited as part of a successful attack.Describe functionality and propagation method of any virus not mentioned in the textbook.Describe functionality and propagation method of any worm not mentioned in the textbook.Describe any real-world botnet, its functionality, size, and purpose.Find a description and explain the risks of an unpatched vulnerability in any modern browser.