Slide 1 24-1 Last time □ Message Integrity □ Authentication □ Key distribution and certification Slide 2 24-2 This time □ Firewalls □ Attacks and countermeasures…