课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Integrity

Integrity

- [Instructor] Information security professionals must also apply controls to protect the integrity of information. As the second leg of the CIA Triad, integrity controls ensure that information is not altered without authorization. Integrity controls protect an organization's information from accidental or intentional tampering that may come as the result of many different issues. Potential integrity failures may result from the intentional alteration of information, such as an employee altering their salary or a student altering their grades. They may come from user error, such as a data entry clerk accidentally entering the wrong information in a field, they may come from software or hardware error, such as an application malfunctioning and writing erroneous data, or they might come from an act of nature, such as a lightning strike that alters information stored on a disk. Hashing is one of the key controls used to protect integrity. A hash function is a mathematical algorithm that…

内容