Availability
Can people use your machine?
Are unauthorized people kept away?
Can attackers interfere? (Blocking this is very difficult!)
Previous slide
Next slide
Back to first slide
View graphic version