Web application security - the fast guide 1.1 | Page 51

Chapter 3 - Vulnerabilities and threat models P a g e | 51 3.4.2 Integrity: preventing any potential unauthorized change or alteration to the information stored, executed or transmitted. Some of the known methods to assure data integrity are the usage of signature and hashing techniques. 3.4.3 Availability: this aspect focus on assuring the continuity of the service and functionality in acceptable time and performance. Availability normally disturbed by different categories of Denial of Service (DOS) attacks. Main method to deal with availability issues are related to the usage of Redundancy, in addition to intrusion detection, prevention and response systems.