Define the integrity property of reliable communication and list all the possible threats to integrity from users and from system components. What measures can be taken to ensure the integrity property in the face of each of these sources of threats
What will be an ideal response?
Integrity - the message received is identical to the one sent and no messages are delivered twice.
threats from users:
• injecting spurious messages, replaying old messages, altering messages during transmission
threats from system components:
• messages may get corrupted en route
• messages may be duplicated by communication protocols that retransmit messages.
For threats from users - at the Chapter 2 stage they might just say use secure channels. If they have looked at
Chapter 7 they may be able to suggest the use of authentication techniques and nonces.
You might also like to view...
The Windows 10 personal digital assistant is called ________
Fill in the blank(s) with correct word
Match the following data checks to their definition:
I. alphabetic II. numeric III. completeness IV. consistency V. range A. ensures data entered into the database fall within a certain set of values B. ensures that all required fields have data entered into them C. confirms that only numbers are entered into a field D. confirms that only textual characters are entered into a field E. compares values in two or more fields to see whether the values are reasonable