First page Back Continue Last page Image
- Use of Hashing to validate information source
- Looking for MitM Threats:
- Example Threats:
- Modifying Corporate Website
- Intercepting eCommerce Transactions
- Modifying Financial Records
- Hashing Algorythms
- MD5 - Message Digest 5
- SHA-1 - Secure Hash Algorythm
Integrity
Has The Data been Modified in Transit ?