is not integrity protected, and thus, the parameters can be tainted (integrity protection failure) : ύϥϝʔλվม͞ΕΔՄೳੑ͕͋Δ B. the source of the communication is not authenticated (source authentication failure) : ϦΫΤετݩͷೝূ͕Ͱ͖ͳ͍ C. the communication through the user agents can be monitored (containment/con fi dentiality failure) : ϒϥβ·ͨͪ͜ΒΛ…  12