Overview#
The word integrity evolved from the Latin adjective integer, meaning whole or complete.[1]Integrity form an Cryptography and Information Security perspective implies a promise that the "data is not changed"
Integrity is often referred to in regards to Data In Transit however Integrity applies to all Data States.
Integrity is a Facet Of Building Trust
More Information#
There might be more information for this subject on one of the following:- A Low Infrastructure Public Key Mechanism Using SPKM
- Accountable vs responsible
- Active attacker
- Application Layer Security
- Attacker
- Authenticated Encryption with Associated Data
- Best Practices for LDAP Security
- Block Cipher Mode
- Burrows Abadi Needham logic
- CDA
- CIA
- CRAM-MD5 SASL Mechanism
- CWC
- Certificate Validation
- Channel Binding
- Claim
- Coherence
- Connection-Oriented Media Transport over the Transport Layer Security (TLS) Protocol in the Session Description Protocol (SDP)
- Consistency
- Cryptographic Primitive
- Cryptography Objectives
- CurveCP
- Cyclic Redundancy Check
- Dat Protocol
- Data Security Impact
- Decentralized Public Key Infrastructure
- Digital Signature
- DigitalSignature
- Domain Name System Security Extensions
- Durability
- Encapsulating Security Payload
- Encryption
- Encryption And Hashing
- End-to-End Communications
- Extended Validation Certificate
- FALLOUT
- FIPS 180
- FIPS 199
- Galois-Counter Mode
- Health Insurance Portability and Accountability Act
- Health Level Seven
- Identity Proofing
- Identity Token
- Information security
- Internet Protocol Security
- JWK Set
- JWT Data Exchange
- Kerberos Error Codes
- Key Encrypting Key
- Key Management
- Keyed-Hash Message Authentication Code
- LDAP Signing
- LDAPServerIntegrity
- LSA Protection
- Message Authentication Code
- Messaging Layer Security
- MimbleWimble
- Minimal Lower Layer Protocol
- NT LAN Manager
- Non-Repudiation
- OAuth 2.0 JWT Secured Authorization Request
- OAuth 2.0 Message Authentication Code (MAC) Tokens
- OAuth 2.0 Protocol Flows
- OAuth 2.0 Security Considerations
- OAuth 2.0 Vulnerabilities
- OpenID Connect Flows
- Protected Data
- Provenance
- Public Key Infrastructure Weaknesses
- Public data
- Quality of Protection
- Record Protocol
- Roots of Trust
- SAFE-BioPharma
- SAML Holder of Key
- SASL
- SHA-1
- SOC 2
- SSL-TLS Interception
- Same Origin Policy
- Secure Socket Layer
- Secure connection
- Security
- Security Information and Event Management
- Security Strength Factor
- Security Token
- Session
- Signature Verification
- Sovrin Foundation
- Symmetric Key Cryptography
- The Simple Public-Key GSS-API Mechanism
- Transport Layer Security
- Trust
- Trust Anchor Management Protocol
- Trusted Execution Environment
- U-Prove
- Unfortunate event
- Universal Integrated Circuit Card
- Vulnerability
- Webtask
- Why Use Tokens