A
A
Countermeasures
2. Security Services
3. Authentication
Purpose: Ensures that users or systems are who they claim to be.
Methods:
o Something You Know: Passwords, PINs.
o Something You Have: Tokens, smart cards.
o Something You Are: Biometrics (fingerprint, retina scans).
Protocols:
o Kerberos: Ticket-based authentication.
o OAuth: Delegated authorization framework.
4. Data Confidentiality
5. Access Control
6. Data Integrity
8. Availability Service
12. Steganography
Definition: Hiding data within non-obvious carriers like images, audio, or video.
Techniques:
o Least Significant Bit (LSB) Method: Embedding data in the least significant bits
of an image’s pixels.
o Frequency Domain Techniques: Embedding data in imperceptible areas of
sound or images.
Applications:
o Covert communication.
o Watermarking for digital copyright protection.