The CIA Triad

Ways to Enforce Integrity:
  1. Authentication doesn't help only in preserving confidentiality but also for integrity because, but verifying the identity of, for example, the developer of a game you download online, you ensure that no one besides only the people you expected to develop this game touched it.
  2. Application Security (covered in Topics 5-6) is needed to verify that the applications one runs on their device don't intentionally or unintentionally modify data in an unwanted way.
  3. Similarly, Network Security (covered in Topic 8) ensures that data isn't modified while being transmitted from one device to another in a way we don't want.
  4. Detecting if an error occurred (Error Detection) or even correcting errors that were detected (Error Correction) (covered in Topic 10) will help keep information unmodified.
  5. Performing Data Backups periodically (covered in Topic 12) is a way to make sure that, even if data is destroyed on one device, we can recover it from the backup we made.