Difference between revisions of "Resource Integrity"
From MgmtWiki
(Created page with "==Full Title or Meme== The ability of the receiver to determine that a received resource has not be tampered with before it is used. ==Context== * Where a digital device is d...") |
(→Context) |
||
Line 5: | Line 5: | ||
* Where a digital device is dependent on the received resource being an exact duplicate of that produced by a trusted party, some sort of authentication code is suppled. Cryptography is used to assure that no attacker could alter the contents without the receiver detecting the alteration. | * Where a digital device is dependent on the received resource being an exact duplicate of that produced by a trusted party, some sort of authentication code is suppled. Cryptography is used to assure that no attacker could alter the contents without the receiver detecting the alteration. | ||
* This is also known a tamper evident protection. | * This is also known a tamper evident protection. | ||
− | + | ==Problems== | |
+ | ==Solutions== | ||
+ | ===Sub Resource Integrity=== | ||
+ | * SRI for the browser is | ||
==References== | ==References== | ||
[[Category: Glossary]] | [[Category: Glossary]] |
Revision as of 21:10, 2 May 2022
Contents
Full Title or Meme
The ability of the receiver to determine that a received resource has not be tampered with before it is used.
Context
- Where a digital device is dependent on the received resource being an exact duplicate of that produced by a trusted party, some sort of authentication code is suppled. Cryptography is used to assure that no attacker could alter the contents without the receiver detecting the alteration.
- This is also known a tamper evident protection.
Problems
Solutions
Sub Resource Integrity
- SRI for the browser is