Q1) What is a DDoS attack? In what two ways was the KrebsonSecurity.com DDoS attack unusual? What specific security weakness did the Mirai malware use to propagate from machine to machine?
-For this Question please see the attached pictures from the text book ( Required) No external search on this question
– half a page
Q2) Using a search engine, find a list of the 5 most common computer crimes of last year. Pick one of the top 5 and describe how it functions and how to guard against it.
– less than a page
-For this Question please see the attached pictures from the text book ( Required) No external search on this question
– half a page
Q2) Using a search engine, find a list of the 5 most common computer crimes of last year. Pick one of the top 5 and describe how it functions and how to guard against it.
– less than a page