Security Introduction Potential attacks Positive attacks Active attacks Cryptography Terminologies Symmetric and asymmetric authentication types of authentication approaches to authentication user login access control protection domains design signature design principle