(A) Choose the correct answer. In order to provide integrity services to Internet messages, detection
techniques are equally as important, if not more so, as prevention techniques. This is because:
(a) Prevention in such situations always requires detection of the attacker who is trying to cause
system damage
(b) iOne cannot hope to prevent malicious modification of data, and hence needs to rely on detec-
tion techniques to recover from potential damage
(c) Detection requires technology that must be prevented from modification
(d) All of the above
(e) None of (a), (b) or (c)
(f) Both (a) and (b)
(g) Both (b) and (c)
(h) Both (a) and (c)