A Layperson's Guide to DoS Attacks