The assurance that information is only accessible or editable by authorized users. Methods used to ensure integrity include strict authentication practices, limiting access to data, and managing physical properties.
Share:
Fresh Security News. Right to Your Inbox.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.