Confidentiality, Integrity, Availability
Smurf Attack
To protect against unauthorized access
To protect data from unauthorized access
SSH
To identify vulnerabilities in a system
Changing passwords frequently
To protect against unauthorized access
To detect and remove malware threats
To fix vulnerabilities in software