SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe objective of this study is to take one inside the buffer overflow attack and bridge the gap between the 'descriptive account' and the 'technically intensive account'. The intent is to provide a logical detailed and technical explanation of the problem and the exploit that can be well understood by all including those with little background in the mechanics and methodology of applications programming. We will begin by looking at the 'problem' and the problem 'mechanism' and then investigate the 'means' and the 'method'. Based on what we find we will conclude with recommendations and a menu for 'prevention'. Hopefully this approach may also help bridge the gap between 'knowledge' and 'understanding'. Although it may never be possible to purge the world of this security concern it is certainly within the realm of possibility that the buffer overflow attack be reduced to a level of insignificance through true understanding.