1.Authentication: verifying the authenticity
of users
2.Identification: identifying users to grant them appropriate access
3.Privacy: protecting information from being seen
4.Integrity: keeping information in its original form
5.Nonrepudiation: preventing parties from denying actions they have taken