Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Source(s): FIPS 200 under INTEGRITY
from 44 U.S.C., Sec. 3542 CNSSI 4009-2015 from
44 U.S.C., Sec. 3542 NIST SP 800-12 Rev. 1 under Integrity from
44 U.S.C., Sec. 3542 NIST SP 800-137 under Integrity from
44 U.S.C., Sec. 3542 NIST SP 800-160 Vol. 1 under integrity (information) from
EGovAct NIST SP 800-172 from 44 U.S.C., Sec. 3552
NIST SP 800-172A from 44 U.S.C., Sec. 3552 NIST SP 800-18 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542 NIST SP 800-30 Rev. 1 under Integrity from
44 U.S.C., Sec. 3542 NIST SP 800-37 Rev. 2 NIST SP 800-39
under Integrity from 44 U.S.C., Sec. 3542 NIST SP 800-53 Rev. 5 from
PL 113-283 (FISMA) NIST SP 800-53A Rev. 5 from PL 113-283 (FISMA)
NIST SP 800-53B from PL 113-283 (FISMA) NIST SP 800-60 Vol. 1 Rev. 1 under Integrity from
44 U.S.C., Sec. 3542 NIST SP 800-60 Vol. 2 Rev. 1 under Integrity from
44 U.S.C., Sec. 3542 NIST SP 800-82 Rev. 2 under Integrity
NIST SP 800-171 Rev. 2 from 44 U.S.C., Sec. 3552 NIST Privacy Framework Version 1.0
under Integrity from 44 U.S.C., Sec. 3542 NISTIR 7621 Rev. 1 under Integrity
The term 'integrity' means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Source(s): NIST SP 800-59
under Integrity from 44 U.S.C., Sec. 3542 (b)(1)(A) The property that data or information have not been altered or destroyed in an unauthorized manner.
Source(s): NIST SP 800-66 Rev. 1 under Integrity from 45 C.F.R., Sec.
164.304 The ability to detect even minute changes in the data. Source(s): NIST SP 800-113 under Integrity
A property whereby data has not been altered in an unauthorized manner since it was created, transmitted, or stored. Source(s): NIST SP 800-152 under Integrity
NIST SP 800-175B Rev. 1 under Data integrity NIST SP 800-57 Part 1 Rev. 5 under Data integrity
NIST SP 800-57 Part 2 Rev.1 under Data integrity The property that received data has not been altered. Source(s):
NIST SP 800-38B under Integrity See Data integrity. Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Integrity (also, assurance of integrity) A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored. Source(s):
NIST SP 800-56B Rev. 2 under Integrity In the general information security context (as defined in [NIST SP 800-53]): guarding against improper modification; includes
ensuring information non-repudiation and authenticity. Source(s): NIST SP 800-57 Part 2 Rev.1 under Integrity In a cryptographic context:
the property that sensitive data has not been modified or deleted in an unauthorized and undected manner since it was created, transmitted or stored. Source(s): NIST SP 800-57 Part 2 Rev.1 under Integrity
the quality of an IT system that reflects the logical correctness and reliability of the operating system; the logical completeness of the hardware and software that implements the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. Source(s):
NIST SP 800-16 under Integrity The property that data has not been modified or deleted in an unauthorized and undetected manner. Source(s):
NIST SP 800-175B Rev. 1 under Integrity A property possessed by data items that have not been altered in an unauthorized manner since they were created, transmitted, or stored. Source(s):
NIST SP 800-133 Rev. 2 under Data integrity The state that exists when computerized data is the same as that in the source documents and has not been exposed to
accidental or malicious alteration or destruction. Source(s): NISTIR 5153 under Integrity from DoD 5200.28-STD
The property that data has not been altered or destroyed in an unauthorized manner. Source(s): NISTIR 5153 under Integrity from ISO DIS
10181-2 The prevention of the unauthorized modification of information. Source(s): NISTIR 5153 under Integrity from
ITSEC Ver. 1.2 The property of information that exists when data has been modified only in a specified and authorized manner (e.g., not modified or destroyed in an accidental or unauthorized, intentional manner). Source(s):
NISTIR 4734 under Integrity Preservation of the original quality and accuracy of data in written or electronic form. Source(s):
NISTIR 7316 under Integrity measures an attacker’s ability to manipulate or remove data from a product or system. Source(s):
NISTIR 7946 under Integrity A measure of the trust that can be placed in the correctness of the information supplied by a PNT service provider. Integrity includes the ability of the system to provide timely warnings to users when the PNT data should not
be used. Source(s): NISTIR 8323 under Integrity from USG FRP (2021)
What are the 3 aspects of security?
Understanding the significance of the three foundational information security principles: confidentiality, integrity, and availability.
What are the 3 Principles of Information Security? The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.
Types of IT security. Network security. Network security is used to prevent unauthorized or malicious users from getting inside your network. ... . Internet security. ... . Endpoint security. ... . Cloud security. ... . Application security..
What is an unauthorized action in cyber security?
Unauthorized Access is when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”.
|