Data Protection and Attack Mitigation discussion
Choose three of the following and write your response to each.
- What are the common tools used for
?
DoS
- How does a Virus spread?
- What is a Buffer-Overflow attack?
- How does a SQL injection attack take place?
- Discuss tools that a hacker can use to crack passwords.
Directions:
- Combined, your responses should be 4-5 pages in length, not including the title or reference pages.
- Be sure to provide citations from your readings and additional research to support your statements.
- Your paper must follow academic writing standards and APA style guidelines, as appropriate.