What is a buffer overflow? Briefly explain this vulnerability.Briefly explain the idea of a race condition.Why is TOCTTOU a security issue?What is the difference between a stack and a heap in context of computer memory?How is canary value used to prevent stack smashing attacks?What buffer overflow attack is more difficult, heap-based or stack-based. Why?Briefly explain two unsafe C functions that are subject to buffer overflow attack.What is a difference between a virus and a worm?What is a difference between an encrypted worm and a polymorphic worm?What is a virus signature?Describe a real-world example of a buffer overflow that was exploited as part of a successful attack.Describe functionality and propagation method of any virus not mentioned in the textbook.Describe functionality and propagation method of any worm not mentioned in the textbook.Describe any real-world botnet, its functionality, size, and purpose.Find a description and explain the risks of an unpatched vulnerability in any modern browser..