Security
Authentication
- Sender of a message must prove their identity
- To thwart impostors who impersonate people
Access Control
- Prohibits or authorizes access to various resources (files, programs, etc.)
- Needs authentication but also more
- Access control lists for resources specify what resources the authorized person may use and how they may use them