1. Authentication mechanism helps to establish proof of identity.
  2. This process ensures that origin of an electronic document or message is correctly identified.
  3. If user C posed as user A and sent message to user B then how would user B will come to know that this message came from user C not from user A.
  4. If user C posed as user A and sent request of fund transfer to user B then user B might will think that request came from user A and he might transfer funds to user A. This type of attack is known as fabrication.

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

©2018 MYBSCIT.com. An initiative by some failures to make student scholars.

or

Log in with your credentials

Forgot your details?