Write your response to each.
1.What are the common tools used for DoS?
2.How does a Virus spread?
3.What is a Buffer-Overflow attack?
4.How does a SQL injection attack take place?
5.Discuss tools that a hacker can use to crack passwords.
Directions:
An introduction and conclusion about the cyber attacks, history and how it can be mitigated then you can respond the questions.
Combined, your responses should be 6-7 pages in length, not including the title or reference pages.
Be sure to provide citations from your readings and additional research to support your statements.
Your paper must follow the academic writing standards and APA style guidelines, as appropriate.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide. The similarity should be less than 20%