Web application security - the fast guide 1.1 | Page 51
Chapter 3 - Vulnerabilities and threat models
P a g e | 51
3.4.2 Integrity:
preventing any potential unauthorized change or alteration to the information
stored, executed or transmitted.
Some of the known methods to assure data integrity are the usage of signature
and hashing techniques.
3.4.3 Availability:
this aspect focus on assuring the continuity of the service and functionality in
acceptable time and performance.
Availability normally disturbed by different categories of Denial of Service (DOS)
attacks.
Main method to deal with availability issues are related to the usage of
Redundancy, in addition to intrusion detection, prevention and response systems.