Current location - Quotes Website - Personality signature - In information security management, digital signature is mainly used to ensure data ().
In information security management, digital signature is mainly used to ensure data ().
A: A.

This topic studies the integrity of information system security attributes.

The main methods to ensure the integrity of the application system are as follows:

(1) protocol: Copying information, deleting fields, invalid fields and modifying fields can be effectively detected through various security protocols.

(2) Error-correcting coding method: thus completing the functions of error detection and error correction. The simplest and commonly used error correction coding method is parity check method.

(3) Password checksum method: it is an important means to resist tampering and transmission failure.

(4) Digital signature: to ensure the authenticity of information.

(5) Notarization: require system management or intermediary agencies to prove the authenticity of information.

The security attribute of information system must be mastered, and it is easy to make multiple-choice questions.