Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Buffer-Overflow Attacks, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Buffer-overflow attacks are based on the principle that hackers can exploit a program’s inability to store a large quantity of data in a buffer. When it attempts to store more data than it was meant to, the additional information can overflow into other buffers, which can potentially overwrite the data that was initially stored within them. This process can occur accidentally, but it is also a major security threat that computer users should be aware of. In the purposeful malignant attack, the excess information that was unable to fit in the original buffer contains codes that are able to cause additional actions rooting from the overflow. This new information has been used in order to access user files and to change important documents.
To ensure that individuals are able to protect any information stored on their private computers, it is essential to understand why these attacks occur. Many information technology professionals believe that it is due to inherent errors present in the C programming language in addition to poor coding that allows the buffering system to become vulnerable. Advanced hackers have been creative in sending buffer-overflow attacks in the form of viruses for the purpose of stealing information. In one particular case that occurred in 2000, users of Microsoft Office were sent an email that initiated the attack. Upon receiving the email, computers became infected even if the users did not open the links it contained (Rouse, 2007).
Since talented hackers can initiate buffer-overflow attacks easily, it is essential to understand how to avoid them. To do so, it is essential for programmers to ensure that buffer-overflows do not occur in the programs they create. This can include using program languages that tend to not result in buffer-overflows, such as PERL, Python, PHP, .NET, Java, and others. Fortunately, even if a program is released that demonstrates this vulnerability, patches can be made in order to resolve some of the existing bugs. When these tools are initially developed, additional programs can be used to screen errors. These compiler tools include StackShield, StackGuard, and Libsafe. In addition to the above recommendations, the creation of vulnerabilities that contribute to buffer-overflow attacks can be resolved in part due to code auditing and developer training. It is essential for programmers to be careful when writing their code and to check for unsafe functions throughout. For example, strncatcan be used instead of strcat andstrncpy can be used instead of strcpy.
To protect against a stack overflow, it is essential to deploy on systems that are capable of using non-executable stacks. Furthermore, the code should be screen to ensure that it isn’t too long and contains junk characters. If a vulnerable programming language is used, programmers should be sure to be up to date in terms of patches, use compilers that protect against the overflows, and use the principle of least privilege. Stack overflows can be prevented using this method as well. Format string buffer-overflow, Unicode overflow, and integer overflow can be resolved using similar methods. To specifically prevent integer overflows however, it is important to use integers without sign values when numbers are not negative and range checking should be utilized after arithmetic operations. Lastly, exceptions should be checked depending on the language that is used and its ability to support this function.
References
Gibson D. (2011). Managing Risk In Information Systems. Jones & Bartlett Learning.
Rouse M. (2007). Buffer Overflow. TechTarget. Retrieved from http://searchsecurity.techtarget.com/definition/buffer-overflow
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee