Data can't be changed by unauthorized entities ## Threats - unauthorized or random data modification - negligence - bugs ## Defense of integrality - checksums - cryptographic checksums - auditing - data correlation systems - antivirus control