Integrity Threats and
Countermeasures
•An integrity threat occurs when an unauthorized party has the chance to alter data while it is being transferred over the Internet or while it is stored on a computer.
•
•The most visible integrity threats have been from Trojan horses, viruses, and worms that attack computers and the programs they run.
•
•A Trojan horse is a small program hidden inside another program that causes harm when the user accesses or downloads the program in which it is hidden.