1) Confidentiality:
To keep a message secret to those that are not authorized to read it.
2) Authentication:
To verify the identity of the user/computer.
3) Access Control:
To be able to tell who can do what with which resource.
4) Integrity:
To make sure that a message has not been changed while on transfer.
5) Non-repudiation:
To make sure that a user can not deny later having participated in a transaction.
6) Availability:
To make sure that the services are always available to users.
No comments:
Post a Comment