Chapter 8 and 9 provided an overview of Defensive Tactics and Technologies and Trade-Offs when addressing threats. Data tampering has become a significant problem in the US and many other countries abroad. You can read an article here that discusses this in more detail:
After reading chapter 8 and 9, you’re ready to participate in the next discussion.
In your textbook, it discusses issues around integrity and specific Tactics for Integrity (p. 149). The author identifies three main ways to address tampering threats: Permissions/ACLs, Use of Cryptographic mechanisms, and the use of logging technology and audit activities as a deterrent.
Please answer the following questions in paragraph form only:
How does having proper permissions and correct access control lists in place help with reducing tampering threats for integrity?
How does the use of cryptographic mechanisms help with reducing tampering threats for integrity?
How does the use of logging technology and audit activities provide a deterrent when addressing issues related to tampering threats for integrity?
I know that much of this information is in your textbook, but I am looking for information from OTHER RESOURCES as well to fully answer the questions above.
You must do the following:
1) Create a new thread. As indicated above, please answer the following questions above. You must use a minimum of three unique references for your initial posts that are preferably from scholarly sources other than your textbook. Also, please cite all references and use proper APA formatting.
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread of your classmates. Feel free to agree or disagree (provides reason why it may still be effective), but please keep it professional and provide support for your stance as opposed to just verbal statements.
ALL original posts and responses to other students must be substantive. (I’m looking for more than just “I agree.”)
Initial posts are due by Thursday, July 25th (20% penalty if submitted late)
Responses to other students are due by Sunday, July 28th (no late submissions will be accepted or graded for responses to other students pass the due date)
Please ask questions if you need assistance on this and please do wait until the last minute for clarification.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more