Encipherment

Digital signature

Access control

Data integrity

Authentication exchange

Traffic padding

Routing control

Notarization

The security services may be provided by means of security mechanism:[1][3][4]


The table1/X.800 shows the relationships between services and mechanisms


Some of them can be applied to connection oriented protocols, other to connectionless protocols or both.


The table 2/X.800 illustrates the relationship of security services and layers:[4]

Access control

Availability

Communication network

Communication protocol

Confidentiality

countermeasure

Data integrity

Digital signature

Exploit (computer security)

Information Security

Integrity

ITU-T

Managed security service

Network security

OSI model

Protocol (computing)

Protocol data unit

Protocol stack

Security control

Security Requirements Analysis

Service Data Unit

Threat (computer)

Vulnerability (computing)

Term in FISMApedia

List of ITU-T Security Activities and Publications