Security services confidentiality: only authorized parties have read access to information integrity: only authorized parties have write access to information availability: authorized access to information when neede authenticity: identity claims(user, message source) can be verified non-repudiation: message exchange can be proved by sender and receiver authorization: information system /resource access contro10 - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to information - availability: authorized access to information when needed - authenticity: identity claims (user, message source) can be verified - non-repudiation: message exchange can be proved by sender and receiver - authorization: information / system / resource access control Security services