From the course: CISSP Cert Prep (2021): 1 Security and Risk Management

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Integrity

Integrity

- [Instructor] Information security professionals must also apply controls to protect the integrity of information. As the second leg of the CIA triad, integrity controls ensure that information is not altered without authorization. Integrity controls protect an organization's information from accidental or intentional tampering that may come as the result of many different issues. Potential integrity failures may result from the intentional alteration of information, such as an employee altering their own salary, or a student altering their grades. They may also come from user error, such as a data entry clerk accidentally entering the wrong information in a field. Or from software or hardware error, such as an application malfunctioning and writing erroneous data to a database. Integrity failures may also come from acts of nature, such as a lightning strike that alters information stored on a disc. Hashing is one of…

Contents