nChoose techniques to mitigate the Threats – cont.:
nDenial of service
nAuthentication
nAuthorization
nFiltering
nThrottling – limiting the number of requests to
the system
nQuality of service – i.e. prioritising the
traffic
nElevation of privilege
nRun with least privilege