Discussion:
Explaining Smurf Attacks
Detecting Smurf Attacks
Methods used to preventing Smurf Attacks
Example of major DoS attack within the last two years. Provide details about the attack, the discovery of the attack, and what did the organization do to fix the problem after discovering the attack.