This document discusses information security and denial of service (DoS) attacks. It begins with an agenda on information security incident handling. It then defines DoS attacks and explains they are aimed at availability, not confidentiality or integrity. It describes different types of DoS attacks including distributed denial of service (DDoS) attacks. The document outlines detection and analysis of DoS attacks as well as containment, eradication, recovery, and post-incident activities. It concludes with ways employees can help maintain network security.