Threat | Description | Solution | Technologies |
DoS attack | Prevent the information system to use its resource, pushing to a big degradation of the quality of services. | Put in place a network and application firewall as well a good anti-virus tool to preserve server machines. | Use RSA private and public keys. A key size of 2048 bits is an excellent choice. |
Degradation of services offered | The information system is not able de deliver an acceptable quality of services. | A redundancy plan is recommended. | Secondary server should have similar characteristics as the principal server. |