integritetsmekanismer
Integritetsmekanismer are approaches and technologies designed to preserve the correctness, consistency, and trustworthiness of data across storage, processing, and communication. They detect unauthorized changes and prevent silent data corruption, complementing confidentiality and availability.
Key techniques include cryptographic methods such as hash functions, message authentication codes (MACs), and digital signatures.
Error detection and correction mechanisms detect and correct faults. Checksums and CRCs identify accidental errors; error‑correcting
Data at rest and in transit are protected by tamper‑evident storage, append‑only logs, hash chaining, and Merkle
Process and governance controls support integrity through change management, versioning, and audit trails. Access control and
Threats include deliberate tampering, malware, insider abuse, replay attacks, and clock spoofing. Defenses rely on cryptographic
Applications span databases with integrity constraints and ACID properties, distributed ledgers that rely on cryptographic chaining,