The CIA Triad
Ways to Enforce Integrity:
- Authentication doesn't help only in preserving confidentiality but also for integrity because, but verifying the identity of, for example, the developer of a game you download online, you ensure that no one besides only the people you expected to develop this game touched it.
- Application Security (covered in Topics 5-6) is needed to verify that the applications one runs on their device don't intentionally or unintentionally modify data in an unwanted way.
- Similarly, Network Security (covered in Topic 8) ensures that data isn't modified while being transmitted from one device to another in a way we don't want.
- Detecting if an error occurred (Error Detection) or even correcting errors that were detected (Error Correction) (covered in Topic 10) will help keep information unmodified.
- Performing Data Backups periodically (covered in Topic 12) is a way to make sure that, even if data is destroyed on one device, we can recover it from the backup we made.