Goals for Security
Data must be kept confidential
Must be able to verify the identity of the sender
Must be able to verify the integrity of the data
Previous slide
Next slide
Back to first slide
View graphic version
Author
|
Title
|
Tracks
|
Home
Send email to Interex
or to the
Webmaster
©Copyright 1998
Interex
. All rights reserved.