The assurance that information is only accessible or editable by authorized users. Methods used to ensure integrity include strict authentication practices, limiting access to data, and managing physical properties.
Want More Content Like This?
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.