Information Science Qeustion
Choose three of the following and write your response to each.
1\ What are the common tools used for denial of service (DoS)?
2\ How does a Virus spread?
3\ What is a Buffer-Overflow attack?
4\ How does a SQL injection attack take place?
5\ Discuss tools that a hacker can use to crack passwords.
Combined, your responses should be 2 pages long. Be sure to provide citations from your readings to support your statements. Your well-written responses should be formatted according to APA style guidelines and wthout plagiarism.