Back to Security Pattern Catalog
Error Detection and Correction
: Core Security, Tampering
Data residing on storage media or in transit across communication links is often susceptible to
errors. This can occur because of bugs in the local system, or because of active attempts
by adversaries to corrupt the data.
How can data be protected from tampering at the intermediaries?
Add redundancy to data to facilitate detection of and recovery from errors. This can be done by simple parity checking or integrity checking based on some hash values.
RAID array. CRC check in disk storage
Comparator Checked Fault Tolerant System
Open Group Catalog
Parity, Hash Value, Integrity
Last modified: May 05, 2012
and Maintained by: Munawar Hafiz