1. Ensures privacy so that only the receiver can read the message.
- Confidentiality
- Integrity
- Authentication
2. Ensures that messages are not altered in transit.
- Confidentiality
- Integrity
- Authentication
3. Guarantees that a message comes from the source that it claims to come from.
- Confidentiality
- Integrity
- Authentication
4. In banking, it can be achieved by requiring a secure personal identification number (PIN) at an ATM.
- Confidentiality
- Integrity
- Authentication
5. Encryption and hashing are used to make certain that only authorized entities can read the message.
- Confidentiality
- Integrity
- Authentication
6. A key is required to encrypt and decrypt a message.
- Confidentiality
- Integrity
- Authentication
7. The receiver can verify that the received message is identical to the sent message and that no manipulation occurred.
- Confidentiality
- Integrity
- Authentication