- There are several tools that are commonly used by hackers to gain illegal access to computers and network to include backdoor, botnet, denial of service attack, phishing and spoofing, robot, zombie worm, Trojan, viruses, and worms. What is a denial of service attack (DoS)? What impact would a denial of service attack have on a major critical infrastructure such as mass transit?
Your response must be at least 200 words in length.
- There are several differences between the terms cyber crime and cyber terrorism. Distinguish between these terms. Explain why it is important for investigators and intelligence agencies to have a clear distinction between each of these terms. Further, outline and explain three examples of cybercrime and three examples of cyber terrorism.
Your response must be at least 200 words in length