Choose three of the following and write your response to each.
- What are the common tools used for DoS?
- How does a Virus spread?
- What is a Buffer-Overflow attack?
- How does a SQL injection attack take place?
- Discuss tools that a hacker can use to crack passwords.
- Combined, your responses should be 2-3 pages in length, not including the title or reference pages.
- Be sure to provide citations from your readings and additional research to support your statements.
- Your paper must follow University academic writing standards and APA style guidelines, as appropriate.
- You are strongly encouraged to submit all assignments to the Turnitin Originality Check.