CRISC Exam: Loss of Integrity Events

Loss of Integrity Events

Prev Question Next Question

Question

Which of the following events refer to loss of integrity? Each correct answer represents a complete solution.

Choose three.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

BCD.

Loss of integrity refers to the following types of losses: -> An e-mail message is modified in transit A virus infects a file -> Someone makes unauthorized changes to a Web site Incorrect Answers: A: Someone sees company's secret formula or password comes under loss of confidentiality.

The concept of information security involves three main components: confidentiality, integrity, and availability. Confidentiality refers to the protection of sensitive information from unauthorized disclosure, while integrity refers to the protection of information from unauthorized modification or destruction. Availability refers to the assurance of timely and reliable access to information by authorized individuals.

Loss of integrity occurs when information is modified or altered without authorization, intentionally or unintentionally. Here are the explanations for each of the given scenarios:

A. Someone sees company's secret formula - This event refers to loss of confidentiality, not loss of integrity. The secret formula may have been disclosed, but it has not been altered.

B. Someone makes unauthorized changes to a Web site - This event refers to loss of integrity. The unauthorized changes made to the website have altered its content or functionality, possibly leading to security vulnerabilities or incorrect information being presented.

C. An e-mail message is modified in transit - This event refers to loss of integrity. The e-mail message has been modified without authorization, potentially leading to the introduction of malicious content or the alteration of critical information.

D. A virus infects a file - This event can refer to both loss of integrity and availability. A virus can modify or corrupt files, leading to loss of integrity, and can also cause files to become unavailable due to damage or encryption.

In summary, options B, C, and D refer to loss of integrity, while option A refers to loss of confidentiality.