Page 36 - CISSO_Prep_ Guide
P. 36

Confidentiality is often provided through encrypting data
            (rendering it unreadable) or masking the data - displaying only
            the last four digits of a credit card, for example.



            Integrity

            Integrity is a very important concept related to accuracy,
            precision, and trusted processing. Integrity ensures that data
            maintains a correct level of precision - is not changed
            improperly, cannot be tampered with, it is complete, and is
            therefore trusted. The integrity of systems refers to the
            correctness of processing, the accuracy of transactions,
            protection from malicious or accidental changes, and the
            principle of least privilege. Integrity can be summed up in three
            core rules:

                   1.  Unauthorized users cannot make modifications
                   2.  Authorized users cannot make improper
                   modifications
                   3.  Maintain internal and external consistency.

            Protecting information from improper modification is
            accomplished by restricting users from making any
            modifications that would not result in the proper accuracy or
            consistency of the information. Any changes made to
            information must update all relevant systems properly and
            ensure that the data on our systems can be trusted. This is done
            through processes such as well-formed transactions and
            separation of duties.

            A transaction is an operation on an information system, usually
            consisting of an input, a process, and an output. Since a large
   31   32   33   34   35   36   37   38   39   40   41