Integrity
In Brief
The integrity criterion is the assurance that information can only be modified by authorised persons or processes and according to an established procedure.
Security measures to ensure the integrity criterion must ensure that no one can change information without permission or in a wrong way.
Endangering the Integrity Criterion
Here is a non-exhaustive list of threats that can jeopardise the integrity of an asset:
- TECHNICAL FAILURES
- Equipment malfunction
- Software malfunction
- Attack on the maintainability of the information system
- UNAUTHORISED ACTIONS
- Illegal use of materials
- Use of counterfeit or copied software
- Data corruption
- Illegal data processing
- COMPROMISE OF FUNCTIONS
- User error
- Abuse of rights
- Usurpation of rights.