Availability
Integrity
Authenticity
Confidentiality
Uploading Files
Buying and selling products
Searching Documents
Recovering files
Payment gateway
E - Commerce gateway
Software gateway
E-Wallets
Brute force attack
Non technical attack
Phlashing
Smurf attack