A hacker is attempting to gain access to a target inside a business. After trying several methods, he gets frustrated and starts a denial of service attack against a server attached to the target. Which security control is the hacker affecting?
a. Firewall
b. Intrusion Detection System (IDS)
c. Access Control
d. Availability