The Overview of Data Integrity
HI Hi, Greetings!
Festival April 
Today, I would like to share with you an article about the overview of Data Integrity. I hope this article has support for a security consultant. Let's move to the article and I will explain part by part.
PART 02:
Data Integrity Types
Integrity constraints, which specify the rules and procedures around operations like deletion, insertion, and update of information, can help organizations preserve data integrity. Both hierarchical and relational databases, such as enterprise resource planning (ERP), customer relationship management (CRM), and supply chain management (CRM) systems, can enforce data integrity definitions.
Data integrity can be achieved by following the steps below:
Physical Integrity
When data is stored and retrieved, physical integrity refers to ensuring its accuracy, correctness, and completeness. Issues including power outages, storage degradation, hackers targeting database functions, and natural calamities can all damage this, preventing reliable data storage and retrieval.
Logical Integrity
The logical integrity of data ensures that it remains intact while it is used in various ways by relational databases. This technique, like physical integrity, tries to protect data from hackers or human error, but it does it in a different way.
There are four different types of logical integrity:
Entity Integrity
Entity integrity is a property of relational databases that store data in tables that may be utilized and linked in a variety of ways. It relies on the creation of primary keys and unique values to identify a piece of data. This prevents data from being repeated and fields in a table from being null.
Referential Integrity
Referential integrity refers to a set of procedures that ensure data is saved and used consistently. Rules that describe how foreign keys are utilized are incorporated in database structures, ensuring that only acceptable data deletion, modifications, and amendments are possible. This will help to avoid data duplication and ensure data accuracy.
Domain Integrity
Domain integrity refers to a set of procedures that ensure the accuracy of data within a domain. A domain is defined by a set of permitted values in a table's columns, as well as constraints and measurements that limit the amount, structure, and type of data that can be entered.
User-defined Integrity
User-defined integrity refers to the creation of rules and limitations around data by users to meet their individual needs. When other integrity processes fail to protect an organization's data, this method is used to create rules that incorporate the organization's data integrity safeguards.

You are welcome to like and leave feedback in the comment area.
Link:
PART 01:
The Overview of Data Integrity - PART- 01
PART 03:
PART 04:
Source:
https://phoenixnap.com/blog/what-data-integrity
https://www.varonis.com/blog/data-integrity
https://heimdalsecurity.com/blog/data-integrity/
M M Zaheer Hussain
Stay Safe!





