Integrity

24th December 2019 | Cybrary Integrity


Integrity is the property whereby information (data), an information system, or a component of a system has not been modified or destroyed in an unauthorized manner. It is also a state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.

How does data Integrity relate to SMBs?

Data Integrity is important when working with critical and sensitive information. For example, if you leave your salary data on a shared drive in your file server and this is what ADP keys off of when Payroll is completed, what would happen if an employee took advantage of a new HR person doing payroll by changing the excel spreadsheet on salaries?  Would you discover the integrity of the Salary Excel had been compromised (not to mention the confidentiality)?

Here are some actions CyberHoot recommends to protect Data Integerity:

  1. Encryption of data while in transit and at rest.
  2. Follow the principle of “Least Privilege” and “Confidentiality
  3. Remove Administrator  privileges monitored to accidental incidents.
  4. Regular data back-ups to ensure data is never lost or changed.

Related Terms: Privacy, Availability, Confidentiality, Data Integrity, System Integrity

Source: CNSSI 4009, NIST SP 800-53 Rev 4, 44 U.S.C., Sec 3542, SANS; From SAFE-BioPharma Certificate Policy 2.5

If you would like to learn more about this topic, watch these short videos:

Integrity – Level 1

Data Integrity – Level 2

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...

Read more
When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more