Computer security - Wikipedia, the free encyclopedia It has been suggested that Cyber security and countermeasure be merged into this article ... Distributed denial of service (DDoS) attacks are common, where a large ... The code from the exploit program is frequently reused in trojan horses and ...