Secrecy
Protecting against unauthorized data disclosure
Ensuring data source authenticity
Integrity
Preventing unauthorized data modification
Man-in-the-middle exploit
E-mail message intercepted; contents changed before forwarded to original destination
Necessity
Preventing data delays or denials (removal)
Delaying message or completely destroying it