Discussion Questions for Week 2: 1. Consider the four historically important buffer overflow exploitation attacks described in Chapter 6, and the security design principles suggested by Saltzer and Schroeder, as listed in Chapter 3. For each attack, which of the principles could have helped prevent or mitigate the attack, had they been followed? Based on these attacks, are there other software security design principles would you suggest? 2. Analyze the textbook's discussion of programming language support as a countermeasure against software attacks. To your knowledge, are all the statements there accurate? How much support does your own favorite language provide against software attacks?