ABSTRACT

The principal technical vulnerability in modern information technology (IT) systems occurs due to flaws

in software. The primary flaws that have caused so many security issues are known as buffer overflows.

Any device using software that accepts input in any form has the potential for a buffer overflow. This

article will present a brief explanation of buffer overflows as well as some strategic and tactical actions

security practitioners can use to avoid buffer overflow attacks.