(1) Cite examples from real life, where the following security objectives are needed: i. Confidentiality ii. Integrity iii. Non-repudiation Suggest suitable security mechanisms to achieve them.
(2) Give a real life example where both confidentiality and integrity is needed. Explain why encryption alone does not provide integrity of information.