Difference between revisions of "Integrity"
Jump to navigation
Jump to search
m (→Turkey) |
|||
Line 6: | Line 6: | ||
{{definition|Information systems and information can be changed by authorized persons or systems only.<ref> [http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/TUR_NCSS.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan]</ref>.}} | {{definition|Information systems and information can be changed by authorized persons or systems only.<ref> [http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/TUR_NCSS.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan]</ref>.}} | ||
<br /> | <br /> | ||
− | + | ====United States==== | |
{{definition|Integrity is guarding against improper information modification or destruction, | {{definition|Integrity is guarding against improper information modification or destruction, | ||
and includes ensuring information non-repudiation and authenticity.<ref name="NISTIR7298"> [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013/NIST SP 800 series]</ref>}}<br /> | and includes ensuring information non-repudiation and authenticity.<ref name="NISTIR7298"> [http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013/NIST SP 800 series]</ref>}}<br /> | ||
+ | |||
=== Standard Definition === | === Standard Definition === | ||
==== ISO/IEC 27000:2014 ==== | ==== ISO/IEC 27000:2014 ==== |
Revision as of 21:58, 18 April 2015
Contents
Definitions
National Definitions
Turkey
Information systems and information can be changed by authorized persons or systems only.[1].
United States
Integrity is guarding against improper information modification or destruction,and includes ensuring information non-repudiation and authenticity.[2]
Standard Definition
ISO/IEC 27000:2014
Property of accuracy and completeness[3].
See also
Notes
- ↑ Turkey's National Cyber Security Strategy and 2013-2014 Action Plan
- ↑ NISTIR 7298 rev 2: Glossary of Key Information Security Terms, May 2013/NIST SP 800 series
- ↑ ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary