-
is an action taken by server when invalid credentials are supplied by users
-
is an action taken by firewall to prevent access to malicious users
-
is an attempt to make a computer resource unavailable to its intended users
-
is a way to prevent Cross Site Scripting attacks