One of the BIG ideas this week is that data can be anything: integers, floats, characters, instructions, etc. We mentioned that this introduces security holes in our system. Describe specifically how someone could exploit this. What is one possible technique that could prevent it and what tradeoffs (if any) would have to be made?