Network Security Threats
Impostors
Claim to be someone else
Need to authenticate the sender--prove that they are who they claim to be
True
Person
Impostor
Previous slide
Next slide
Back to first slide
View graphic version