KIM COMPUTER


Integrity in Information Security

Integrity is the second pillar of the CIA Triad. It ensures that information assets are accurate, complete, and reliable, and that data has not been altered, destroyed, or fabricated in an unauthorized manner.


1. Goal of Integrity

The main goal is to ensure that data is trustworthy and remains in the state it was intended to be, without being manipulated or corrupted at any point.

2. Key Technologies and Measures for Integrity

Measures to achieve integrity are primarily split into change prevention and change verification.

① Change Verification: Hashing

Hashing is the most fundamental technique to detect if data has been modified.

② Access Control

Strictly limiting which entities have the permission to modify the data.

③ Procedural Protection