Network Security (3)
Protection components:
-
- Authentication - identifying of the origin of information (typically associated with logon procedures). Public key technologies (RSA, DSA) are used to create digital signatures
-
- Authorization - providing authenticated users with access services through access rights