This topic studies the integrity of information system security attributes.
The main methods to ensure the integrity of the application system are as follows:
(1) protocol: Copying information, deleting fields, invalid fields and modifying fields can be effectively detected through various security protocols.
(2) Error-correcting coding method: thus completing the functions of error detection and error correction. The simplest and commonly used error correction coding method is parity check method.
(3) Password checksum method: it is an important means to resist tampering and transmission failure.
(4) Digital signature: to ensure the authenticity of information.
(5) Notarization: require system management or intermediary agencies to prove the authenticity of information.
The security attribute of information system must be mastered, and it is easy to make multiple-choice questions.