What are the common tools used to protect against a DoS or DDoS attack?
What is malware and how does it spread?
What is a Buffer-Overflow attack?
How does a SQL injection attack take place?
What are some of the tools that a hacker can use to crack passwords?
Your paper should meet the following requirements: