| Describe what is meant by a “Denial-of-Service” attack. Do you believe that denial-of-service attacks could realistically be used as part of a cyberterrorism or cyber warfare campaign? Is there any evidence of this technique being used successfully by nation-states as part of warfare? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Preferred language style US English |
