Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability. All extranets also require authentication methods and, often, confidentiality. Other extranets require that all six goals be reached. Those goals are Authentication and access control techniques are used to achieve Confidentiality and are mentioned in the section security practices. Integrity Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers, air traffic control, and financial accounting. Information can be erased or become inaccessible, resulting in loss of availability. This means that people who are authorized to get information cannot get what they need. Availability Availability is often the most important attribute in service-oriented businesses that depend on information (e.g., airline schedules and online inventory systems). Availability of the network itself is important to anyone whose business or education relies on a network connection. When a user cannot get access to the network or specific services provided on the network, they experience a denial of service. Improving Security In the face of the vulnerabilities and incident trends discussed above, a robust defense requires a flexible strategy