Assignment 19086

What are the common tools used for DoS?
How does a Virus spread?
What is a Buffer-Overflow attack?
How does a SQL injection attack take place?
Discuss tools that a hacker can use to crack passwords.
Combined, your responses should be 3-4pages in length, not including the title or reference pages.
Be sure to provide citations from your readings and additional research to support your statements.
Your paper must follow academic writing standards and APA style guidelines, as appropriate.