Email, virtual private network (VPN) connections, and other forms of enterprise-grade encryption use symmetric, asymmetric, and one-way encryption all at once.
The various encryption methods enable you to achieve:
- Data confidentiality
- Data integrity
- Authentication
- Access control
- Nonrepudiation
The Slide Show below describes these security services.
Access control designates the resources a user or service may access on the system or network. Access controls include valid IDs and passwords to control access to system resources. Controls on FTP include when the services can be accessed and by whom (by user or host name). Similarly, HTTP and email have access control restrictions.