This document discusses denial of service (DoS) and distributed denial of service (DDoS) attacks. It defines DoS and DDoS attacks, describes different types of attacks including SYN floods and Smurf attacks, and discusses the costs of DoS attacks for victims. The document also recommends strategies for organizations to mitigate DDoS attacks such as strategic firewall placement, default deny policies, and monitoring source IP addresses to detect attacks. An example simulation shows how strategic firewall placement can help systems continue operating during DDoS attacks.