1. What is a buffer overflow? Use the Internet to find a well-known buffer overflow attack (therehave been several). In your own words, summarize how the attack works within a paragraph (please cite your source).
2. Read the article entitled, "Escaping Dark Age Cybersecurity". Briefly summarize this article. What is meant by the "Motte andBaily" model? How should we be thinking differently about modern c../@brons/escaping-dark-age-cybersecurity-thinking 3e7b0c74bda8#.e3vp7bmd7