Integrity
(OBJ 1.2)
Integrity definition
- Helps ensure that information and data remain accurate and unchanged from its original state unless intentionally modified by an authorized individual
- Verifies the accuracy and trustworthiness of data over the entire lifecycle
- In the world of cybersecurity we expect that our data is going to be reliable and unaltered as is processed transform and stored by our systems and networks.
Important for 3 main reasons
- To ensure data accuracy
- One of the most important reasons, the accuracy of data will be critically important.
- Maintaining data integrity ensures that decisions are made based on correct information and with the expected outcomes
- To maintain trust
- If your balance was altered for no reason, you would no longer trust your bank with your money.
- To ensure system operability
- If data is corrupted, our systems can malfunction.
- It could cause systems to crash or become unresponsive
5 basic methods to ensure integrity
To help us maintain the integrity of our data, systems, and networks, we usually utilize five methods
- Hashing
- Process of converting data into a fixed-size value
- Any minor alteration to data would result in a vastly different Hash.
- The results of a Hashing function is called a Hash Digest, which will almost server like a Digital Fingerprint for any given piece od data to prove its integrity.
- Hashing is the number one way that you're going to see the maintenance of Integrity for all of our data, our software, our systems, and our networks out in the real world.
- Digital Signatures
- Use encryption to ensure both integrity and authenticity
- Encrypting the hash digest using the user's private key is a common example.
- Checksums
- Method to verify the integrity of data during transmission
- By comparing the sender's Checksum of that transmitted data with the receiver's calculated Checksum for the received data, we can determine if any unintended changes in the data have been created.
- When data is sent from one location to another the Checksum will be sent along with it. Upon receipt, the recipient can compute a new Checksum for the received data and compare it to the provided Checksum that was sent over the network. If those two values match, this indicates the data has not been tampered with during the transmission and therefore Integrity has been maintained.
- Access Controls
- Ensure that only authorized individuals can modify data and this reduces the risk of unintentional or malicious alterations
- Prevents outsiders from tempering information.
- Regular Audits
- Involve systematically reviewing logs and operations to ensure that only authorized changes have been made, and any discrepancies are immediately addressed