Posted by Thomas Davon on

One of the core goals of information security is to protect the integrity of information. This is very important because when the integrity of information is compromised, it puts the information at risk and the persons or assets concerned as well.

The integrity of information asset is in its wholeness, completeness, and uncorrupted nature.

When information is exposed in such a way that it becomes corrupt, that information’s integrity has been compromised and is no longer authentic. Information can be corrupted during storage or transmission. This is one of the problems of the electronic information system. Computer systems and gadgets are subject to virus attacks which may corrupt the information contained in the computer system or gadget. Sometimes a computer can be affected by what is known as worms. Viruses and worms are sometimes designed with the specific aim of corrupting data. One major way you can tell if your computer system has been affected by worms or viruses is by observing some changes in file integrity though the size of the files.

You can also detect the integrity of information through file hashing. Here, a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a hash value.


Usually, the hash value for any combination of bits is unique. If after hashing a file twice using the same algorithm and the computer indicates two different numbers, it means the integrity of that file and the information in it has been compromised.

Information integrity is the mainstream of every information system. The value of the information is dependent on the integrity of the information. If the information has been compromised, then it is seemingly valueless depending on the level of compromise

A file may be corrupted by hackers or by noise in the transmission media.

Sometimes transmitting data on a circuit with a low voltage level can alter and corrupt the data. Redundancy bits and check bits can compensate for internal and external threats to the integrity of information.

← Older Post Newer Post →

Leave a comment

Please note, comments must be approved before they are published.