The Overview of the CIA Triad
HI Hi, Greetings!
Happy December 
Today, I would like to share with you an article about the overview of the CIA Tired. Let's move to the article and I will explain part by part.
PART 02:
2. INTEGRITY :
Integrity refers to how well you safeguard information against unauthorized modification or destruction. These safeguards ensure that your data is accurate and complete and that no unauthorized changes have been made. The concept of integrity states that all data saved on your systems, as well as data exchanged between systems, such as email, is kept intact.
To keep sensitive practical integrity, you must not only limit access at the system level but also ensure that your system users can only change information that they are officially permitted to change.
Unintentional tampering, such as user errors or data loss as a result of any system failure, must also be protected by effective integrity countermeasures.
Take the finance industry, for example, where there is a pressing need to ensure that all transactions across its systems/sub-systems are completely safe and unaffected by manipulation.
In February 2016, cyber hackers created $1 billion in fraudulent withdrawals from the Central Bank of Bangladesh's account at the Federal Reserve Bank of New York, making it one of the most well-known financial data integrity breaches in recent history. The hackers devised a complex scheme that included obtaining the necessary credentials to initiate the withdrawals, as well as infecting the banking system with malware that deleted the transfer database records and suppressed the confirmation messages that would have alerted banking authorities to the fraud. Although most of the transfers were halted or the funds recovered when the plan was revealed, the crooks were still able to make off with more than $60 million.

There are a variety of countermeasures you can use to protect integrity:
Access control and strict authentication can assist in preventing unwanted changes by authorized users.
Hash verification and digital signatures can assist in confirming that transactions are genuine and that files haven't been tampered with.
Administrative controls such as division of roles and training are also critical in ensuring data integrity.
You are welcome to like and leave feedback in the comment area.
Link:
PART 01:
The Overview of the CIA Triad- PART 01
PART 03:
Source:
https://www.forcepoint.com/cyber-edu/cia-triad
https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html
M M Zaheer Hussain
Stay Safe!




