Home TOC |
Search
Feedback |
Protecting Messages
In a distributed computing system, a significant amount of information is transmitted through networks in the form of messages. Message content is subject to three main types of attacks:
- Messages might be intercepted and modified for the purpose of changing the affects they have on their recipients.
- Messages might be captured and reused one or more times for the benefit of another party.
- Messages might be monitored by an eavesdropper in an effort to capture information that would not otherwise be available.
Such attacks can be minimized by using integrity and confidentiality mechanisms.
TBD. Sections will be added that explain how to use integrity and confidentiality mechanisms to protect message content.
Home TOC |
Search
Feedback |