1. Summary of the research problem
a. This should be thorough enough (but not plagiarized (meaning in your own words)) to give a reader a very good idea of:
i. What is malware in general and in particular a virus
ii. What is a buffer overflow
iii. How does a virus (or maybe other malware) exploit bugs in a software?
iv. What is Data Execution Prevention (DEP)
2. Answer to the questions for the research problem which are based on the textbook readings or outside sources (these are not your opinion but you can include comments)
a. In discussing the summary of the case you may answer some of these questions already
3. Conclusion which is your thoughts on the research problem and its contents