- Resisting Attacks
Nonrepudiation, confidentiality, integrity, and assurance.
- Authenticate Users
Ensure that a user or remote computer is actually who it purports to be.
- Authorize Users
Ensure that an authenticated user has the rights to access and modify either data or services.
- Maintain Integrity
Use redundant information, such as checksums or hash results, to ensure that data are delivered as intended.
- Limit Exposure
Design systesm sot that limited services are available on each host.
- Limit Access
Restrict access based on message source or destination port.