1) Access control
Prevent unauthorized access to resources.
2) Authentication
Verification of user identity.
3) Confidentiality
Providing security to data sent through network
4) Integrity
No modification should be done during transmission.
5) Non-repudiation
Preventing from DOS attacks.
***