1 |
Protection components:
-
-
Authentication - identifying of the origin of information (typically associated with logon procedures). Public key technologies (RSA, DSA) are used to create digital signatures
-
-
Authorization - providing authenticated users with access services through access rights
|