Completion requirements
Buffer overflow attacks can often be avoided with proper system configurations. In this video, you will learn about buffers and how a buffer can be exploited in a buffer overflow attack. Pay attention to the seriousness of a buffer overflow attack and the possible outcome of this type of attack. What affect can the attack have on a system? How would a buffer overflow attack be initiated against a system? What procedures should be in place to avoid a buffer overflow attack? What programming languages are vulnerable to buffer overflow attacks?
Source: National Consortium for Mission Critical Operations, https://www.youtube.com/watch?v=SOoJcrR4Ijo This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, 26 July 2024, 12:25 PM