Define the integrity property of reliable communication and list all the possible threats to integrity from users and from system components. What measures can be taken to ensure the integrity property in the face of each of these sources of threats

What will be an ideal response?


Integrity - the message received is identical to the one sent and no messages are delivered twice.
threats from users:
• injecting spurious messages, replaying old messages, altering messages during transmission
threats from system components:
• messages may get corrupted en route
• messages may be duplicated by communication protocols that retransmit messages.
For threats from users - at the Chapter 2 stage they might just say use secure channels. If they have looked at
Chapter 7 they may be able to suggest the use of authentication techniques and nonces.

Computer Science & Information Technology

You might also like to view...

Define pseudocode.

What will be an ideal response?

Computer Science & Information Technology

What standarizes sounds and video format so plug-ins like Flash are no longer needed?

A. SMTP B. IMAP4 C. JavaScript D. HTML5

Computer Science & Information Technology

The components of an Access database are known as ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

If you are replacing built-in audio with a sound card, you don't need to make any changes to your system first

Indicate whether the statement is true or false

Computer Science & Information Technology