Tools for mitigating cyber attacks
Write your response to each.
1.What are the common tools used for DoS?
2.How does a Virus spread?
3.What is a Buffer-Overflow attack?
4.How does a SQL injection attack take place?
5.Discuss tools that a hacker can use to crack passwords.
An introduction and conclusion about the cyber attacks, history and how it can be mitigated then you can respond the questions.
Combined, your responses should be 6-7 pages in length, not including the title or reference pages.
Be sure to provide citations from your readings and additional research to support your statements.
Your paper must follow the academic writing standards and APA style guidelines, as appropriate.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide. The similarity should be less than 20%
Cyber attack is defined as the deliberate exploitation of networks, enterprises which are dependent on technology, and intentional exploitation of computer systems. These attacks use code that is malicious to alter and interfere with computer code, data or logic, hence resulting in troublemaking consequences that can bring inconveniences on data and cause cybercrimes such as identity theft and information (McClure et al., 2009). Cyber attacks target national, corporate organizations and the general public and are taking place through the spread of viruses,