... provides data encryption to low-level IP packets. ! Cryptography By using cryptography, you can programmatically encrypt or hash data before sending it to a user, or before storing it on the Web ... Introduction to Web Security After a principal is authenticated, the principal will want to access resources, such as files, registry keys, Active Directory® directory service attributes, and databases. ... Authentication can occur in many places in a Web application. When a user connects to a Web application, the Web server can authenticate the user. If a Web page in the Web application accesses a COM+ component,...