Chapter 8 and 9 provided an overview of Defensive Tactics and Technologies and Trade-Offs when addressing threats. Data tampering has become a significant problem in the US and many other countries abroad. You can read an article here that discusses this in more detail:
After reading chapter 8 and 9, you’re ready to participate in the next discussion.
In your textbook, it discusses issues around integrity and specific Tactics for Integrity (p. 149). The author identifies three main ways to address tampering threats: Permissions/ACLs, Use of Cryptographic mechanisms, and the use of logging technology and audit activities as a deterrent.
Please answer the following questions in paragraph form only:
- How does having proper permissions and correct access control lists in place help with reducing tampering threats for integrity?
- How does the use of cryptographic mechanisms help with reducing tampering threats for integrity?
- How does the use of logging technology and audit activities provide a deterrent when addressing issues related to tampering threats for integrity?
I know that much of this information is in your textbook, but I am looking for information from OTHER RESOURCES as well to fully answer the questions above.
You must do the following:
1) Create a new thread. As indicated above, please answer the following questions above. You must use a minimum of three unique references for your initial posts that are preferably from scholarly sources other than your textbook. Also, please cite all references and use proper APA formatting.