Computer security attributes

Attack methods

Technology for Internet/IT environment security

Confidentiality

Eavesdropping, hacking, phishing, DOS, and IP spoofing

IDS, firewall, cryptography systems, IPsec, and SSL

Integrity

Viruses, worms, Trojans, eavesdropping, DOS and IP spoofing

IDS, firewall, anti-malware software, IPsec, and SSL

Privacy

Email bombing, spamming, hacking, DOS and cookies

IDS, Firewall, Anti-Malware Software, IPsec, and SSL

Availability

DOS, email bombing, spamming and systems boot record infectors

IDS, firewall, anti-malware software