Integrity

24th December 2019 | Cybrary Integrity


Integrity is the property whereby information (data), an information system, or a component of a system has not been modified or destroyed in an unauthorized manner. It is also a state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.

How does data Integrity relate to SMBs?

Data Integrity is important when working with critical and sensitive information. For example, if you leave your salary data on a shared drive in your file server and this is what ADP keys off of when Payroll is completed, what would happen if an employee took advantage of a new HR person doing payroll by changing the excel spreadsheet on salaries?  Would you discover the integrity of the Salary Excel had been compromised (not to mention the confidentiality)?

Here are some actions CyberHoot recommends to protect Data Integerity:

  1. Encryption of data while in transit and at rest.
  2. Follow the principle of “Least Privilege” and “Confidentiality
  3. Remove Administrator  privileges monitored to accidental incidents.
  4. Regular data back-ups to ensure data is never lost or changed.

Related Terms: Privacy, Availability, Confidentiality, Data Integrity, System Integrity

Source: CNSSI 4009, NIST SP 800-53 Rev 4, 44 U.S.C., Sec 3542, SANS; From SAFE-BioPharma Certificate Policy 2.5

If you would like to learn more about this topic, watch these short videos:

Integrity – Level 1

Data Integrity – Level 2

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The rapid rise of generative AI has unlocked enormous promise, but it’s also accelerating the arms race in...

Read more