Identity
Establishing identity permits access control
What is identity in cyberspace?
Attribution
When is it desirable?
Impersonation
How can it be prevented?
Forgery is really easy
Just set up your mailer with bogus name and email
Previous slide
Next slide
Back to first slide
View graphic version