Tel: 03333 200 222
Email: [email protected]

What is Integrity in cyber security?

06/01/2023
2 minute read
Confidentiality, Integrity and Availability, known as the CIA triad, is a model developed to guide information security policy within an organization.
By, Jack Wong
Share

Data Integrity in cyber security is about the reliability and accuracy of data. It is proposed to prevent data that does not conform to the semantics in the database and prevent invalid operations or wrong information caused by the input and output of false information.

Data integrity is one of the three essential points of information security, which refers to ensuring that information or data is not tampered with unauthorized or can be quickly discovered after tampering while transmitting and storing data information.

What is CIA Triad?

Confidentiality, Integrity and Availability, known as the CIA triad, is a model developed to guide information security policy within an organization.

Confidentiality is ensuring data, or information remains confidential and protected from those who are not supposed to see it.

Availability is essentially ensuring that systems remain online and accessible to those who need them.

Integrity is about maintaining data consistency and reliability, which is ensuring data doesn't get changed when it is not supposed to be. However, if it does get changed, some alert or something will be raised. Therefore, an analyst can investigate the change.

Types of Data Integrity in cyber security

Data Integrity is divided into four categories and these are:

Entity Integrity

Entity integrity is one of the relational model's three rules of database integrity. Entity integrity rules require all data tables to have primary keys and all fields as primary keys to have unique and non-null values.

Domain Integrity 

Domain integrity refers to the validity of the input of a column and whether null values ​​are allowed. Domain integrity is enforced by: restricting the type (by setting the data type of the column), the format (by Check constraints and rules), or the range of possible values ​​(by Foreign Key constraints, Check constraints, Default definitions, Not Null definitions and rules). For example, the student's test score must be between 0 and 100, and the gender can only be "male" or "female".

Referential integrity

Referential integrity is based on the relationship between foreign keys and primary keys and it refers to ensuring the referential relationship between the primary key (referenced table) and the external key (referenced table). It involves the consistent maintenance of data in two or more tables. A foreign key value associates a record in the referenced table that contains the foreign key with a record in the referenced table whose primary key matches the foreign key.

Referential integrity also maintains defined relationships between tables as records are entered, changed, or deleted, ensuring that key values ​​are consistent across all tables. Such consistency requirements ensure that non-existing values ​​are not referenced and that if a key value changes, all references to that key value are subject to consistent changes throughout the database.

User-defined integrity

User-defined integrity is a constraint condition for a specific relational database that reflects the semantic requirements that the data involved in a particular application must meet. It mainly includes non-null constraints, unique constraints, check constraints, primary key constraints, and foreign key constraints.

Databases have several methods to ensure data integrity, including foreign keys, constraints, rules, and triggers. The system handles the relationship of these four well, using different methods for specific situations and relying on each other to complement each other's weaknesses.

More from Swiftcomm

Efficient and Affordable Fixed Cost IT Support in Peterborough: Your Solution for Seamless Tech Management
In today's fast-paced business world, technology plays a pivotal role in the success of organisations, regardless of their size. As companies increasingly rely on technology to streamline business operations, enhance customer experiences, and gain a competitive edge, reliable IT support has never been more critical. In this blog, we will explore the world of fixed cost IT support in Peterborough—a solution that offers efficiency and affordability for support specialists while ensuring seamless tech management for businesses.
Full Article
right-chevron
Addressing Diverse Industry Challenges: IT Support for SME London
The thriving business landscape of London comprises a diverse array of small and medium-sized enterprises (SMEs) spanning various industries, each with its own unique IT needs and challenges. From finance and healthcare to creative agencies and manufacturing businesses, the technology requirements can significantly differ. This is where IT support providers play a crucial role, offering tailored solutions to address the diverse industry challenges faced by SMEs in London. When it comes to IT support for SME London, these providers offer customized solutions that can help businesses thrive in this dynamic environment.
Full Article
right-chevron
grey-tick-icon
Trusted by 100s of businesses already
grey-tick-icon
Uniquely tailored approach
grey-tick-icon
Outstanding customer service
swift-tag

Talk with us

We pride ourselves on being an honest trustworthy business communications provider
phone-icon
Telephone
Call 03333 200 222 or if you would prefer us to call you.
Schedule a call
email-icon
Email
We love emails, to send us one use [email protected] or fill in our
Contact Form
chat-icon
Live Chat
Got a question? Our live chat is open and ready to assist
Chat Now
Contact a specialist
crosschevron-down