Provided by: Accent Social and Welfare Society
Topic: Data Management
Date Added: Dec 2012
In computer network world, the needs for security and proper systems of control are obvious and find out the intruders who do the modification and modified data. Now-a-days, frauds that occur in companies are not only by outsiders but also by insiders. Insider may perform illegal activity & try to hide illegal activity. Companies would like to be assured that such illegal activity i.e. tampering has not occurred, or if it does, it should be quickly discovered. Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions.