Demonstrates what needs to happen in response to a Denial of Service (DOS) on a fictitious medical practice. There are 2 sources listed in the bibliography of this 8-page paper.