Donny Koh

6%
Flag icon
Integrity can be examined from three perspectives: Preventing unauthorized subjects from making modifications Preventing authorized subjects from making unauthorized modifications, such as mistakes Maintaining the internal and external consistency of objects so that their data is a correct and true reflection of the real world and any relationship with any child, peer, or parent object is valid, consistent, and verifiable
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating