Saturday, January 11, 2014

Security Service

 1) Access control

    Prevent unauthorized access to resources.

2) Authentication

    Verification of user identity.

3) Confidentiality

    Providing security to data sent through network

4) Integrity

    No modification should be done during transmission.

5) Non-repudiation

    Preventing from DOS attacks.


***