Security Architecture and Design Tactics for Integrity Discussion

Chapter 8 and 9 provided an overview of Defensive Tactics and Technologies and Trade-Offs when addressing threats. Data tampering has become a significant problem in the US and many other countries abroad. You can read an article here that discusses this in more detail: After reading chapter 8 and 9, you’re ready to participate in the next discussion.In your textbook, it discusses issues around integrity and specific Tactics for Integrity (p. 149). The author identifies three main ways to address tampering threats: Permissions/ACLs, Use of Cryptographic mechanisms, and the use of logging technology and audit activities as a deterrent.Please answer the following questions in paragraph form only:I know that much of this information is in your textbook, but I am looking for information from OTHER RESOURCES as well to fully answer the questions above.

× How can I help you?