Mitigation Tools | Threats | |||||||||
Trojan Horse | Virus | Worms | Malware | Adware | DOS Attacks | SQL Injection | Spyware | Phishing Attacks | Ransomware | |
Anti-virus | 1 | 4 | 1 | 1 | 2 | 0 | 0 | 0 | 0 | 0 |
Anti-spyware | 1 | 0 | 1 | 0 | 1 | 0 | 0 | 2 | 0 | 0 |
Spam Filters | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 1 |
Firewalls | 1 | 3 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
IDS | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Password Policy | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Educate Employees | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 0 |
Anti-DOS | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Load Balancers | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Web Filters | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |