When implementing a product that offers protection against Distributed Denial of Service (DDoS) attacks, the security concept being followed is availability. DDoS protection ensures that systems and services remain accessible to legitimate users even under attack, maintaining the availability of network resources. * Availability: Ensures that systems and services are accessible when needed, which is directly addressed by DDoS protection. * Non-repudiation: Ensures that actions or transactions cannot be denied by the involved parties, typically achieved through logging and digital signatures. * Integrity: Ensures that data is accurate and has not been tampered with. * Confidentiality: Ensures that information is accessible only to authorized individuals.