Which term refers to unauthorized modification of data?

Prepare for the CompTIA Security+ (SY0-701) exam. Enhance your skills with flashcards and multiple-choice questions, each with explanations. Excel in your certification!

The term that refers specifically to unauthorized modification of data is an integrity violation. Integrity in the context of data security ensures that information remains accurate, consistent, and trustworthy over its entire lifecycle. When data is altered without proper authorization, that integrity is compromised, leading to potential inaccuracies or false information being presented. This situation highlights the importance of maintaining data integrity through controls such as access controls, logging, and validation processes to prevent unauthorized changes.

In contrast, a data breach typically involves unauthorized access to data rather than modification. An information leak refers to the unauthorized disclosure of data, often to an external party, without focusing on changes made to the data itself. An access violation pertains to the illegitimate access to resources or systems rather than the integrity of the data. Understanding these distinctions is crucial for recognizing and mitigating risks related to data security.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy