Any violation of integrity is significant because it may be the first step in a successful attack against system
availability or confidentiality. Contaminated systems and corrupted data must be dealt with immediately to assess
the potential for further violation or damage. The integrity of digital assets can be controlled by logging, digital
signatures, hashes, encryption and access controls.