Network Security Threats
Interception
If interceptor cannot read, have confidentiality (privacy)
If cannot modify without detection, have message integrity
Previous slide
Next slide
Back to first slide
View graphic version