Define the integrity property of reliable communication and list all the possible threats to integrity from users and from system components. What measures can be taken to ensure the integrity property in the face of each of these sources of threats
What will be an ideal response?
Integrity - the message received is identical to the one sent and no messages are delivered twice.
threats from users:
• injecting spurious messages, replaying old messages, altering messages during transmission
threats from system components:
• messages may get corrupted en route
• messages may be duplicated by communication protocols that retransmit messages.
For threats from users - at the Chapter 2 stage they might just say use secure channels. If they have looked at
Chapter 7 they may be able to suggest the use of authentication techniques and nonces.
You might also like to view...
Define pseudocode.
What will be an ideal response?
What standarizes sounds and video format so plug-ins like Flash are no longer needed?
A. SMTP B. IMAP4 C. JavaScript D. HTML5
The components of an Access database are known as ________
Fill in the blank(s) with correct word
If you are replacing built-in audio with a sound card, you don't need to make any changes to your system first
Indicate whether the statement is true or false