Information Science Qeustion
Pin It
Choose three of the following and write your response to each.
1\ What are the common tools used for denial of service (DoS)?
2\ How does a Virus spread?
3\ What is a Buffer-Overflow attack?
4\ How does a SQL injection attack take place?
5\ Discuss tools that a hacker can use to crack passwords.
Combined, your responses should be 2 pages long. Be sure to provide citations from your readings to support your statements. Your well-written responses should be formatted according to APA style guidelines and wthout plagiarism.