Last Updated on February 5, 2022 by Admin 3
Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?
- Packet filtering
- Authentication
- Firewall
- Digital signature