12.1 LRIT communications using land-line links
should provide for data security using methods such as:
-
.1 authorization: Access should only be granted
to those who are authorized to see the specific LRIT information;
-
.2 authentication: Any party exchanging information
within the LRIT system should require authentication before exchanging
information;
-
.3 confidentiality: Parties running an application
server should protect the confidentiality of the LRIT information
to ensure that it is not disclosed to unauthorized recipients when
it travels across the LRIT system; and
-
.4 integrity: Parties exchanging LRIT information
should ensure that the integrity of the LRIT information is guaranteed
and that no data has been altered.