1 |
Access Control (or Authorization)
-
Assurance that the person or computer at the other end of the session is permitted to do what he asks for.
|
2 |
Authentication
-
Assurance that the resource (human or machine) at the other end of the session is what it claims to be
|
3 |
Integrity
-
Assurance that the information that arrives is the same as when it was sent
|
4 |
Accountability (or non-repudiation)
-
Assurance that any transaction that takes place can subsequently proved to have taken place
|
5 |
Privacy
-
Assurance that sensitive information is not visible to an eavesdropper (usually achieved using encryption)
|