First page Back Continue Last page Image
Integrity
- Use of Hashing to validate information source
- Looking for MitM Threats:
- Example Threats:
- Modifying Corporate Website
- Intercepting e-Commerce Transactions
- Modifying Financial Records
- Hashing Algorithms
- MD5 - Message Digest 5
- SHA-1 - Secure Hash Algorithm
Has The Data been Modified in Transit ?