Which aspect of security is concerned with preventing the unauthorized modification of information?

  Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Source(s):
FIPS 200 under INTEGRITY from 44 U.S.C., Sec. 3542
CNSSI 4009-2015 from 44 U.S.C., Sec. 3542
NIST SP 800-12 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-137 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-160 Vol. 1 under integrity (information) from EGovAct
NIST SP 800-172 from 44 U.S.C., Sec. 3552
NIST SP 800-172A from 44 U.S.C., Sec. 3552
NIST SP 800-18 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-30 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-37 Rev. 2
NIST SP 800-39 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-53 Rev. 5 from PL 113-283 (FISMA)
NIST SP 800-53A Rev. 5 from PL 113-283 (FISMA)
NIST SP 800-53B from PL 113-283 (FISMA)
NIST SP 800-60 Vol. 1 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-60 Vol. 2 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-82 Rev. 2 under Integrity
NIST SP 800-171 Rev. 2 from 44 U.S.C., Sec. 3552
NIST Privacy Framework Version 1.0 under Integrity from 44 U.S.C., Sec. 3542
NISTIR 7621 Rev. 1 under Integrity

  The term 'integrity' means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Source(s):
NIST SP 800-59 under Integrity from 44 U.S.C., Sec. 3542 (b)(1)(A)

  The property that data or information have not been altered or destroyed in an unauthorized manner.
Source(s):
NIST SP 800-66 Rev. 1 under Integrity from 45 C.F.R., Sec. 164.304

  The ability to detect even minute changes in the data.
Source(s):
NIST SP 800-113 under Integrity

  A property whereby data has not been altered in an unauthorized manner since it was created, transmitted, or stored.
Source(s):
NIST SP 800-152 under Integrity
NIST SP 800-175B Rev. 1 under Data integrity
NIST SP 800-57 Part 1 Rev. 5 under Data integrity
NIST SP 800-57 Part 2 Rev.1 under Data integrity

  The property that received data has not been altered.
Source(s):
NIST SP 800-38B under Integrity

  See Data integrity.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Integrity (also, assurance of integrity)

  A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored.
Source(s):
NIST SP 800-56B Rev. 2 under Integrity

  In the general information security context (as defined in [NIST SP 800-53]): guarding against improper modification; includes ensuring information non-repudiation and authenticity.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Integrity

  In a cryptographic context: the property that sensitive data has not been modified or deleted in an unauthorized and undected manner since it was created, transmitted or stored.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Integrity

  the quality of an IT system that reflects the logical correctness and reliability of the operating system; the logical completeness of the hardware and software that implements the protection mechanisms; and the consistency of the data structures and occurrence of the stored data.
Source(s):
NIST SP 800-16 under Integrity

  The property that data has not been modified or deleted in an unauthorized and undetected manner.
Source(s):
NIST SP 800-175B Rev. 1 under Integrity

  A property possessed by data items that have not been altered in an unauthorized manner since they were created, transmitted, or stored.
Source(s):
NIST SP 800-133 Rev. 2 under Data integrity

  The state that exists when computerized data is the same as that in the source documents and has not been exposed to accidental or malicious alteration or destruction.
Source(s):
NISTIR 5153 under Integrity from DoD 5200.28-STD

  The property that data has not been altered or destroyed in an unauthorized manner.
Source(s):
NISTIR 5153 under Integrity from ISO DIS 10181-2

  The prevention of the unauthorized modification of information.
Source(s):
NISTIR 5153 under Integrity from ITSEC Ver. 1.2

  The property of information that exists when data has been modified only in a specified and authorized manner (e.g., not modified or destroyed in an accidental or unauthorized, intentional manner).
Source(s):
NISTIR 4734 under Integrity

  Preservation of the original quality and accuracy of data in written or electronic form.
Source(s):
NISTIR 7316 under Integrity

  measures an attacker’s ability to manipulate or remove data from a product or system.
Source(s):
NISTIR 7946 under Integrity

  A measure of the trust that can be placed in the correctness of the information supplied by a PNT service provider. Integrity includes the ability of the system to provide timely warnings to users when the PNT data should not be used.
Source(s):
NISTIR 8323 under Integrity from USG FRP (2021)

What are the 3 aspects of security?

Understanding the significance of the three foundational information security principles: confidentiality, integrity, and availability.

What are the aspects of information security?

What are the 3 Principles of Information Security? The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What are 4 types of information security?

Types of IT security.
Network security. Network security is used to prevent unauthorized or malicious users from getting inside your network. ... .
Internet security. ... .
Endpoint security. ... .
Cloud security. ... .
Application security..

What is an unauthorized action in cyber security?

Unauthorized Access is when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”.