Movement of data get larger day by day with respective increment of devices and connectivity among them. It leads the risk of cyber attack. In this paper, we present an overview of Data Integrity Attack (DIA) and its recovery ways with detail. The usage of destructive malware, malicious activity and forthright faults done by insider are the possible ways to provide platform for the data integrity attack.Numerus systems need to join together to prevent, detect and recover of data integrity is imperil. This paper explores systems to effectively watch and identify data corruption in various components like server, OS, applications and software configurations. Here we also examine issues of auditing and reporting. Addressing problems in real world around data integrity the resulting example solution will be composed of open source components. Through this paper we guide the solution and practical steps need to implement solution that addresses these existing challenges.
Volume 12 | 03-Special Issue
Pages: 1507-1512
DOI: 10.5373/JARDCS/V12SP3/20201404