Answer :

Answer:

A: Using Encapsulating Security Payload

B: Using MACs (Message Authentication Codes)

Explanation:

Data integrity means that, the data should be authentic and accurate. This data is not being attempted to change and it is as accurate as sent by the sender. In transmission path different protocols has been used to make sure and maintain the integrity of message or data.

We can perform this by using Encapsulating Security Payload , where the data is encapsulate and hidden between security keys. This protocol ensures the integrity and confidentiality of data between sender and receiver.

MAC (Message authentication Codes) are small codes that are added along with the data while sending by the sender. These codes ensures the data integrity and protect it from the hackers. These codes make sure that data will not changed during transmission.

Lanuel

This question is lacking the necessary answer options, so I will be adding them here:

A: Using Encapsulating Security Payload.

B: Using MACs (Message Authentication Codes).

C: Keeping a symmetric key secret.

D: Implementing flood guards.

So, given your question, some examples of the integrity principle that can ensure your data is accurate and untampered with are:

A: Using Encapsulating Security Payload.

B: Using MACs (Message Authentication Codes).

Cyber security refer to a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, and network engineers.

In Cyber-security, two (2) examples of an integrity principle to ensure user data is accurate and untampered with are:

I. Encapsulating Security Payload (ESP): it is a standard protocol that is typically used to ensure secrecy for the data (contents) transmitted during  network communications, as well as system-to-system authentication, data accuracy and data integrity verification in order to prevent an unauthorized access. Thus, ESP provides data confidentiality, integrity, accuracy and authentication in IPv4 and IPv6 network protocols.

II. Message Authentication Codes (MACs): it is a cryptographic checksum or symmetric tag that is attached to a message and used to ensure data integrity, accuracy and authenticity.

Read more: https://brainly.com/question/24214475

Other Questions