Threats | Mitigation Tools | |||||||||
Anti-virus | Anti-spyware | Spam Filters | Firewalls | IDS | Password Policy | Educate Employees | Anti-DOS | Load Balancers | Web Filters | |
1. Trojan Horse | 1 | 1 | 0 | 1 | 1 | 1 | 0 | 0 | 0 | 0 |
2. Virus | 4 | 0 | 0 | 3 | 2 | 2 | 0 | 0 | 0 | 0 |
3. Worms | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
4. Malware | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
5. Adware | 2 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
6. DOS Attacks | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 |
7. SQL Injection | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
8. Spyware | 0 | 2 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
9. Phishing Attacks | 0 | 0 | 1 | 0 | 0 | 0 | 2 | 0 | 0 | 0 |
10. Ransomware | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |