cryptography
confidentiality , snooping, traffic analysis
integrity modification, masquerading, relaying, repudiation
availability Denial of Service
passive attack
active attack
nonrepudiation
encipherment, asymmetric-key encipherment
authentication, notarization