Integrity Threats and
Countermeasures
•An integrity threat occurs when an unauthorized party
has the chance to alter data
while it is being transferred over the Internet or while it is stored on a computer.
•
•The most visible
integrity threats have been from Trojan horses, viruses, and worms that attack computers and the
programs they run.
•
•A Trojan
horse is a small program hidden inside
another program that causes harm
when the user accesses or downloads
the program in which it is hidden.