The IT Law Wiki
m
Tag: sourceedit
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Definition ==
+
== Definitions ==
   
 
'''System integrity''' is
 
'''System integrity''' is
   
 
{{Quote|[t]he quality that a [[system]] has when it performs its intended function in an unimpaired manner, free from [[unauthorized]] [[manipulation]] of the [[system]], whether [[intentional]] or accidental.<ref>[[NIST Special Publication 800-27A]]; [[CNSSI 4009]] Adapted.</ref>}}
 
{{Quote|[t]he quality that a [[system]] has when it performs its intended function in an unimpaired manner, free from [[unauthorized]] [[manipulation]] of the [[system]], whether [[intentional]] or accidental.<ref>[[NIST Special Publication 800-27A]]; [[CNSSI 4009]] Adapted.</ref>}}
  +
  +
{{Quote|[t]he [[attribute]] of an [[information system]] when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent [[unauthorized]] [[manipulation]] of the [[system]].<ref>NICCS, Explore Terms: A Glossary of Common Cybersecurity Terminology ([http://niccs.us-cert.gov/glossary#letter_s full-text]).</ref>}}
  +
  +
{{Quote|the ability to [[execute]] the correct instructions using the correct [[data]]. It is important to recognize that [[attack]]ing the [[cyber]] [[subsystem]] can [[disrupt]] proper [[function]]ing of the physical [[subsystem]](s) of the [[CPS]] or cause the [[system]] to function in accordance with an improper set of [[instruction]]s.<ref>[[Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff]], at 59.</ref>}}
   
 
== References ==
 
== References ==
 
<references />
 
<references />
  +
  +
== See also ==
  +
  +
* [[System integrity control]]
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Definition]]
 
[[Category:Definition]]

Latest revision as of 05:33, 24 March 2015

Definitions[]

System integrity is

[t]he quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.[1]
[t]he attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.[2]
the ability to execute the correct instructions using the correct data. It is important to recognize that attacking the cyber subsystem can disrupt proper functioning of the physical subsystem(s) of the CPS or cause the system to function in accordance with an improper set of instructions.[3]

References[]

See also[]