Objective
Confidentiality (privacy)
Integrity (has not been altered)
Authentication and Non-repudiation (who created or sent the data)
Data Hiding
****************************************************************************************************
Technique
Symmetric/Private Key Cryptography
Asymmetric/Public Key Cryptography
Hashing Algorithms
Steganography