Trust in Data
Now the point here is to ensure that the data hasn’t been tampered with. However I would say that you cannot trust any piece of data unless you trust the person and the application that has enabled the d
What if some of the identity data got corrupted and this wasn’t detected and so the corrupt data was also backed up. To further exacerbate this problem, the people whose identity information had been affected did not do anything that required identity verification for a month or so. Think about the effects. Now what if organised crime found a way to deliberately corrupt that data…
Far-fetched? I currently have a battle with a major telecommunications company in the UK where they somehow “lost” some of my electronic payments and cut off my internet access as a result. They did all of this, in spite of the fact that I had overpaid them by over £100. Six months on, they found that my payments had somehow been put into a different account. Until I spoke to a good friend I met through FIRST, the telecommunications vendor had been unable to track the problem.
ata to be created. As the Microsoft Establishing End to End trust paper states, each of the components in the trust stack are interdependent.
In fact this is probably the easiest component to protect if it weren’t for the fact that in general people are untrustworthy and that there was so much malware about that can contaminate and infect our software but let me look at one aspect not mentioned and that is of data corruption and relate it to my last blog on Trust in People