Pages

IP Address Tracker

IP
Arun Anoop M

Wednesday, December 26, 2012

Security services

1) Confidentiality:

To keep a message secret to those that are not authorized to read it.

2) Authentication:

To verify the identity of the user/computer.

3) Access Control:

To be able to tell who can do what with which resource.

4) Integrity: 

To make sure that a message has not been changed while on transfer.

5) Non-repudiation:

To make sure that a user can not deny later having participated in a transaction.

6) Availability:

To make sure that the services are always available to users.

No comments:

Post a Comment