U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

integrity

Abbreviation(s) and Synonym(s):

Data integrity

Definition(s):

  Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Source(s):
FIPS 200 under INTEGRITY from 44 U.S.C., Sec. 3542
CNSSI 4009-2015 from 44 U.S.C., Sec. 3542
NIST SP 800-171 Rev. 2 from 44 U.S.C., Sec. 3552
NIST SP 800-37 Rev. 2
NIST SP 800-53 Rev. 5 from PL 113-283 (FISMA)
NIST SP 800-53B from PL 113-283 (FISMA)
NIST SP 800-172 from 44 U.S.C., Sec. 3552
NIST SP 800-12 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-137 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-18 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-30 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-39 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-53A Rev. 4 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-60 Vol. 1 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-60 Vol. 2 Rev. 1 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-82 Rev. 2 under Integrity from NIST SP 800-53
NIST SP 800-160 Vol. 1 under integrity (information) from EGovAct
NISTIR 7621 Rev. 1 under Integrity
NIST Privacy Framework Version 1.0 under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-171 Rev. 1 [Superseded] from 44 U.S.C., Sec. 3542
NIST SP 800-37 Rev. 1 [Superseded] under Integrity from 44 U.S.C., Sec. 3542
NIST SP 800-53 Rev. 4 [Superseded] under Integrity from 44 U.S.C., Sec. 3542

  The term 'integrity' means guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Source(s):
NIST SP 800-59 under Integrity from 44 U.S.C., Sec. 3542 (b)(1)(A)

  The property that data or information have not been altered or destroyed in an unauthorized manner.
Source(s):
NIST SP 800-66 Rev. 1 under Integrity from 45 C.F.R., Sec. 164.304

  The ability to detect even minute changes in the data.
Source(s):
NIST SP 800-113 under Integrity

  A property whereby data has not been altered in an unauthorized manner since it was created, transmitted, or stored.
Source(s):
NIST SP 800-152 under Integrity
NIST SP 800-57 Part 2 Rev.1 under Data integrity
NIST SP 800-175B Rev. 1 under Data integrity
NIST SP 800-57 Part 1 Rev. 5 under Data integrity
NIST SP 800-57 Part 2 [Superseded] under Data integrity

  The property that received data has not been altered.
Source(s):
NIST SP 800-38B under Integrity

  See Data integrity.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Integrity (also, assurance of integrity)
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Integrity (also, Assurance of integrity)
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Integrity (also, Assurance of integrity)

  A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored.
Source(s):
NIST SP 800-56B Rev. 2 under Integrity
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Data integrity

  In the general information security context (as defined in [NIST SP 800-53]): guarding against improper modification; includes ensuring information non-repudiation and authenticity.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Integrity

  In a cryptographic context: the property that sensitive data has not been modified or deleted in an unauthorized and undected manner since it was created, transmitted or stored.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Integrity

  the quality of an IT system that reflects the logical correctness and reliability of the operating system; the logical completeness of the hardware and software that implements the protection mechanisms; and the consistency of the data structures and occurrence of the stored data.
Source(s):
NIST SP 800-16 under Integrity

  The property that data has not been modified or deleted in an unauthorized and undetected manner.
Source(s):
NIST SP 800-175B Rev. 1 under Integrity

  A property possessed by data items that have not been altered in an unauthorized manner since they were created, transmitted, or stored.
Source(s):
NIST SP 800-133 Rev. 2 under Data integrity

  The state that exists when computerized data is the same as that in the source documents and has not been exposed to accidental or malicious alteration or destruction.
Source(s):
NISTIR 5153 under Integrity from DoD 5200.28-STD

  The property that data has not been altered or destroyed in an unauthorized manner.
Source(s):
NISTIR 5153 under Integrity from ISO DIS 10181-2

  The prevention of the unauthorized modification of information.
Source(s):
NISTIR 5153 under Integrity from ITSEC Ver. 1.2

  The property of information that exists when data has been modified only in a specified and authorized manner (e.g., not modified or destroyed in an accidental or unauthorized, intentional manner).
Source(s):
NISTIR 4734 under Integrity

  Preservation of the original quality and accuracy of data in written or electronic form.
Source(s):
NISTIR 7316 under Integrity

  measures an attacker’s ability to manipulate or remove data from a product or system.
Source(s):
NISTIR 7946 under Integrity

  A measure of the trust that can be placed in the correctness of the information supplied by a PNT service provider. Integrity includes the ability of the system to provide timely warnings to users when the PNT data should not be used.
Source(s):
NISTIR 8323 under Integrity from USG FRP (2021)

  Protection against unauthorized modification or destruction of information. [NSTISSI 4009]. A state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
Source(s):
NIST SP 800-32 [Withdrawn] under Integrity from NSTISSI 4009 - plus note

  A property possessed by data items that have not been altered in an unauthorized manner since they were created, transmitted or stored.
Source(s):
NIST SP 800-133 [Superseded] under Data integrity
NIST SP 800-133 Rev.1 [Superseded] under Data integrity

  The security goal that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).
Source(s):
NIST SP 800-27 Rev. A [Withdrawn]

  The security objective that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).
Source(s):
NIST SP 800-33 [Withdrawn]

  A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored. In this Recommendation, the statement that a cryptographic algorithm "provides data integrity" means that the algorithm is used to detect unauthorized alterations.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Data integrity

  Quality of a system or product reflecting the logical correctness and reliability of the operating system; verification that the original contents of information have not been altered or corrupted.
Source(s):
NIST SP 800-70 Rev. 2 [Superseded] under Integrity

  In the general information security context: guarding against improper modification and includes ensuring information non-repudiation and authenticity [SP 800-53]. In a cryptographic context: the property that sensitive data has not been modified or deleted in an unauthorized and undetected manner.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Integrity from NIST SP 800-53 - plus note

  A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored. In this Recommendation, the statement that a cryptographic algorithm "provides data integrity" means that the algorithm is used to detect unauthorized alterations.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Data integrity