Guaranteeing that data is accurate and has not been tampered with. If a bank balance changes without a transaction, the integrity is blown.
Solid security never relies on a single "front door." Instead, it uses —a layered approach borrowed from medieval castle design: Physical Security: Locks, cameras, and biometric scanners. Fundamentals of information systems security
The system must know who you are (ID) and you must prove it (via passwords, tokens, or biometrics). Guaranteeing that data is accurate and has not
Ensuring that systems and data are ready for use when needed. A secure system is useless if it’s crashed by a Denial-of-Service (DoS) attack. 2. The Human Element: Policy and People Fundamentals of information systems security