System Integrity: Ensuring Integrity
System integrity begins with selecting and deploying the right hardware and software components to authenticate a user’s identity—and help prevent others from assuming it. In doing so, it needs to offer efficient administrative functions to restrict access to administrator-level functions, and give administrators processes and controls to manage changes to the system. There are many individual components to system integrity, such as vulnerability assessment, antivirus, and anti-malware solutions. However, the ultimate goal from an access control standpoint is to prevent the installation and execution of malicious code—while protecting valuable data—from the outset.
This white paper provides an overview of the Microsoft technologies that help safeguard critical information and offers typical real-life examples.
Included in This Document
System Integrity Issues
The Technologies Supporting System Integrity
DownloadSystem Integrity: Ensuring Integrity
Microsoft Word file