ABSTRACT
The principal technical vulnerability in modern information technology (IT) systems occurs due to flaws
in software. The primary flaws that have caused so many security issues are known as buffer overflows.
Any device using software that accepts input in any form has the potential for a buffer overflow. This
article will present a brief explanation of buffer overflows as well as some strategic and tactical actions
security practitioners can use to avoid buffer overflow attacks.