Objective

Technique

Confidentiality (privacy)

Symmetric/Private Key Cryptography

Integrity (has not been altered)

Asymmetric/Public Key Cryptography

Authentication and Non-repudiation (who created or sent the data)

Hashing Algorithms

Data Hiding

Steganography