Select and research one of the many types of Deceptions and briefly provide a description, deployment (methods) and countermeasures.
• Denial-of-service attacks
• Trojan horses
post a relevant summary of your findings. ( Stick to current data, not older than five years ). Use not more than three (3) references.