๐งฑ CISSP Study Note: Integrity
๐งฑ CISSP Study Note: Integrity
๐ Definition
Integrity refers to guarding against improper information modification or destruction, and includes ensuring the authenticity and non-repudiation of information.
In short, it ensures that data remains accurate, consistent, and trustworthy, and that any changes are authorized and traceable.
๐ง Why It Matters in Cybersecurity
Integrity is one of the three foundational pillars of the CIA Triad:
-
Confidentiality
-
Integrity ✅
-
Availability
Without integrity, even data that is confidential and available can’t be trusted. Inaccurate or tampered data can cause financial losses, system malfunctions, failed transactions, or life-threatening decisions in critical systems like healthcare or aviation.
๐ What Integrity Protects
| Element | Risk |
|---|---|
| Stored Data | From unauthorized alteration or corruption (e.g., log files, databases). |
| Data in Transit | From being intercepted and modified (e.g., during file uploads or messaging). |
| Digital Communications | From impersonation or forgery (e.g., emails, signed contracts). |
๐ ️ Mechanisms to Ensure Integrity
| Technique | Description |
|---|---|
| Hashing | Creates a unique digital fingerprint of data to detect changes. |
| Digital Signatures | Confirms message origin and integrity via asymmetric encryption. |
| Checksums | Detects accidental data corruption during transmission or storage. |
| Access Controls | Prevents unauthorized users from modifying information. |
| Version Control | Tracks and reverts unauthorized or accidental changes. |
| Audit Logs | Captures who made changes, when, and what was altered. |
๐ Related Concepts
| Concept | Description |
|---|---|
| Non-repudiation | Ensures a sender cannot deny having sent a message or initiated a transaction. |
| Authenticity | Confirms that data comes from a legitimate, trusted source. |
| Data Validation | Ensures that only correct and expected inputs are accepted. |
✅ Example (CISSP-Style)
A financial firm uses SHA-256 hashing and digital signatures to protect transaction logs. If a log is altered in any way, its hash no longer matches the original.
✅ This ensures integrity, non-repudiation, and authenticity—critical in detecting fraud or tampering.
๐ Found In CISSP Domains
| Domain | Focus |
|---|---|
| ๐ Domain 1: Security and Risk Management | Defines integrity as a core security principle. |
| ๐ Domain 3: Security Architecture and Engineering | Explains cryptographic and technical controls to enforce integrity. |
| ๐ Domain 7: Security Operations | Emphasizes monitoring and auditing for data modification. |
๐ Memory Hook
“Integrity = Trust in the Truth.”
If the data isn’t correct, complete, and confirmed—you can’t act on it.
Comments
Post a Comment