Computer security attributes | Attack methods | Technology for Internet/IT environment security |
Confidentiality | Eavesdropping, hacking, phishing, DOS, and IP spoofing | IDS, firewall, cryptography systems, IPsec, and SSL |
Integrity | Viruses, worms, Trojans, eavesdropping, DOS and IP spoofing | IDS, firewall, anti-malware software, IPsec, and SSL |
Privacy | Email bombing, spamming, hacking, DOS and cookies | IDS, Firewall, Anti-Malware Software, IPsec, and SSL |
Availability | DOS, email bombing, spamming and systems boot record infectors | IDS, firewall, anti-malware software |