Copyright 2002 by
Prentice Hall, Inc.
8-17
1.Authentication: verifying the authenticity of users
2.Identification: identifying users to grant them appropriate access
3.Privacy: protecting information from being seen
4.Integrity: keeping information in its original form
5.Nonrepudiation: preventing parties from denying actions they have taken
Security in the Internet Age: Security’s Five Pillars