Goals for Security
Data must be kept confidential
Must be able to verify the identity of the sender
Must be able to verify the integrity of the data
Previous slide
Next slide
Back to first slide
View graphic version