Integrity Data - Avoiding data corruption caused by malware, preventing unauthorized changes to data, and making sure data arrives intact and unaltered at its intended location on a network, On-path attack - An attack (also known as a man-in-the-middle attack) is a real-time attack on a live network connection., Replay attacks - A hacker sniffs the packets between a client and a server in hopes of obtaining authentication information., Impersonation - A social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system., Unauthorized changes - On-path attacks, replay attacks, and session hijacking are often used to gain unauthorized access to a system. With system access, hackers can steal even more confidential information. They can also alter or corrupt data. Cyber criminals often launch destructive malware attacks that compromise data integrity and disrupt communication networks., CIA - Confidentiality, Integrity, Availability,

CyberSecurity - Integrity (CIA)

Leaderboard

Visual style

Options

Switch template

Continue editing: ?