logo

Buffer Overflow Attacks and Defenses

   

Added on  2020-05-08

6 Pages952 Words133 Views
 | 
 | 
 | 
Running head: ETHICAL HACKING AND DEFENCEEthical Hacking And Defence Name of the Student Name of the University Author Note
Buffer Overflow Attacks and Defenses_1

1ETHICAL HACKING AND DEFENCEExecutive SummaryThis report looks into the aspect of ethical hacking, also regarded as penetration testing is the process thoughwhich weaknesses are located in computer and information systems, by way of duplicating the intent and actionsof malicious hackers. An ethical hacker is a security professional who implements the hacking skills as a way ofdefence on behalf of the owners of financial systems.
Buffer Overflow Attacks and Defenses_2

2ETHICAL HACKING AND DEFENCETable of Contents1. Introduction..........................................................................................................................................................32. Discussion............................................................................................................................................................32.1 Risks And Remediation Advice......................................................................................................................32.2 How the exploit was developed......................................................................................................................43. Conclusion............................................................................................................................................................44. References............................................................................................................................................................5
Buffer Overflow Attacks and Defenses_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents