Cyber Attacks (IT Security)
In a well-written paper, write a response to the following five questions:
What are the common tools used to protect against a DoS (Denial of Service) or DDoS (Distributed Denial-of-Service) attack?
What is malware and how does it spread?
What is a Buffer-Overflow attack?
How does a SQL injection attack take place?
What are some of the tools that a hacker can use to crack passwords?
Your paper should meet the following requirements:
Be 3 pages in length, not including the cover page and reference page.
Follow the APA guidelines. Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.
Support your answers with at least three scholarly journal article.
Be clearly and well written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.