‹#›
VII CONSORTIUM
Why We Need Security
The receiver of a message is not able to determine, without additional mechanisms, whether
Øa message originates from a trustworthy and legitimate device, and whether
Øthe message was modified between sender and receiver
1.
Devices found to be transmitting “bad” messages need to be removed from the system until repaired or replaced:
Ødefective devices
Øhacked devices