Land Attack
Against these types of hacking or attacks, what the technology suggests to overcome them.
Regards.