Siirry sisältöön
Savela logo production network expert
  • NIS2 Directive
  • ServicesLaajenna
    • Firewall service
    • Substation consulting
    • SCADA consulting
    • Process network risk analysis
    • Information security audit of the production network
    • Communication solutions for the production network
    • Information security survey for the company
  • GuidesLaajenna
    • What is an OT network? A guide to the world of production networks!
    • What is information security? A guide to secure business!
  • Customer cases
  • Blog
  • About us
  • Give us a call
Savela logo production network expert
Information security

What does data integrity mean?

Information security consultantLauri Jurvanen Päivitetty2.1.2024
What does data integrity mean - Save LAN answers

The immutability and preservation of data in all situations is key information security in a production company when developing.

In this article, we will look at the definition of data integrity and how this principle should be reflected in a production company's OT network.

Content of the article
  • Integrity of information security - definition
  • How should the data integrity principle be applied in a production company's OT network?
    • Consistency of data storage must be taken into account in the OT network at several levels
    • SHA hashes
    • Data security auditing as a guarantee of data integrity
  • Summary
  • Frequently asked
    • What are the areas of information security
    • What does it mean to be indisputable?
    • What is meant by confidentiality, integrity, availability and authentication of information in the context of information security?

Integrity of information security - definition

Data integrity refers to the reliability and consistency of data or information. Its ultimate goal is to ensure that data remains unchanged during transmission, storage and retrieval. The basic principle of data integrity is that the data is always accurate, complete and seamless, which is ensured through a variety of security tools and protocols.

In practice, integrity can be divided into physical and logical integrity.

  • Ensuring physical integritythat the structural integrity of the data is maintained under all circumstances, for example in the event of equipment failure or power outages.
  • Logical integrity focuses on the content of the data, ensuring that the data is consistent and comprehensively managed.

How should the data integrity principle be applied in a production company's OT network?

Data integrity production network Save LAN Oy
The principle of data integrity must also be implemented in the production networks of companies

Protecting data integrity is particularly critical in a manufacturing company's OT network, which always handles sensitive data such as production data and other important data.

Corruption or other damage to data can lead to serious consequences, such as interruption of production, loss of customer data or even damage to the reputation of the business. Let's look at how these problems can be tackled in production and communications networks.

Consistency of data storage must be taken into account in the OT network at several levels

Firstly, data transmission and storage systems must be reliable and have appropriate safeguards to prevent damage, loss or unauthorized modification of data.

Secondly, systems must be able to identify and correct any breaches of data integrity, such as incorrect or falsified data. Third, staff must be trained to understand the importance of data integrity and to follow best practices to ensure it.

Give us a call, then let's fix things in the production network

SHA hashes

One way to ensure the integrity of data is the SHA seal, which stands for Secure Hash Algorithm. It is a hash algorithm used to ensure the integrity of files and messages. SHA seals are one-way, which means that a file or a message cannot be restored to its original form based on its hash seal alone. SHA seals are often used to ensure the authenticity, integrity and integrity of files and messages.

SHA secure hash algorithm SHA seals production network security - Save LAN Oy
Secure Hash Algorithm

There are several types of SHA seals, the most common being the SHA1, SHA2 and SHA3 seals. SHA1 is no longer considered safe and its use is not recommended. SHA2-256 and SHA2-512 and SHA3 are all safe seals that can be used in a wide range of applications. The number 256 in SHA2-256 means that the seal will always produce the number of bits corresponding to that number, regardless of the length of the source material.

SHA seals are created by taking a file or a message and converting it into a series of numbers. These numbers are the hash digest of the file or message. An SHA hash can be used to verify the authenticity, integrity and integrity of a file or a message by comparing the hash of the file or message with its actual hash. If the hash seals are different, the file or message has been modified.

Information security auditing as a guarantee of data integrity

To ensure the integrity of data, it is vital that a comprehensive security audit is implemented in the company's operations. This is the process whereby experts review and assess the organization's information security systems and the processes that maintain them. All data in all systems and the way it is processed are reviewed to ensure data integrity and consistency.

Security auditing in production network and telecommunication network - Save LAN Oy
Ensure data integrity with regular security audits

The key objective of the audit is to identify any weaknesses that could compromise the integrity or change the state of the information. This could include system errors, inadequate data processing or security vulnerabilities. Information security experts also analyze how the company is responding to potential security problems to ensure an effective response to any future threats.

The results of the audit will not only allow the company to identify and correct any weaknesses, but also to improve its security policies and processes. This means, for example, introducing new security solutions, improving staff training or enhancing security management processes.

However, it is important to understand that security auditing is only part of a wider security management process. In addition to auditing, a company must also continuously monitor and assess the security of its information systems to ensure that data remains intact under all circumstances.

Summary

Data integrity is a key part of a company's information security. Ensuring this requires both technical solutions and staff training. Data integrity is particularly important in a manufacturing company's OT network, where business-critical data is often processed. Investing in security is therefore an investment that supports business continuity and helps avoid serious security problems.

Frequently asked

What are the areas of information security

The general areas of information security are availability, confidentiality and integrity. Complementary areas are non-repudiation, authentication and authentication. General security is the protection of information against loss, theft, corruption or other inappropriate alteration.

Information security can be approached from different perspectives or sub-areas, each of which covers its own part of the overall security picture:

  1. Administrative data security - This includes strategic and operational management of information security, such as security controls, procedures and guidelines.
  2. Physical safety - This refers to physical security measures that protect IT equipment and premises, such as locked doors, surveillance cameras and fire protection.
  3. Device security - This includes maintaining the security of computers, servers, network devices and other equipment.
  4. Application security - This means ensuring security in software, including developing applications with security in mind and managing updates.
  5. Document security - This includes the secure management, storage and handling of electronic and paper data.
  6. Network security - This includes securing the transmission of data, such as encryption of network traffic and firewall service (e.g. hosted by Save LAN)
  7. Staff information security - This area covers roles, responsibilities and compliance with security guidelines by staff.
  8. User safety - This area of security is related to user authentication and password policies, and is often combined with software security.

What does it mean to be indisputable?

The indisputability of information security refers to the fact that the origin of an action taken or a message sent in a digital environment cannot be challenged afterwards. Based on strong user authentication, encryption and digital signatures, non-repudiation is a key element of legal protection and responsible use of information security.

What is meant by confidentiality, integrity, availability and authentication of information in the context of information security?

Confidentiality of information in the context of data security means that only those persons who are entitled to access the data have access to it. Integrity means that the data remain unchanged and their authenticity can be verified. Usability of information security indicates that the information can be used when needed and is accessible when it is needed. Authentication means verifying the identity of a user or device, for example with a password or biometric, before access to the data is allowed.

Artikkelien selaus

Edellinen Edellinen
What does the availability of information security mean?
SeuraavaJatka
What is SCADA?

SERVICES

  • Firewall service-firewall-company-data network-Save-LAN-1

    Firewall service

    Secure your business network! Firewall Service Firewall Service is a service provided by Save LAN...

    Read more

  • Process network risk analysis Production network security prediction Save LAN Oy Lauri Jurvanen

    Process network risk analysis

    Make the production network safe! Process network risk analysis Process network risk analysis is a strategic tool that...

    Read more

  • What does technical security consist of Save LAN Lauri answers

    Information security audit of the production network

    Make the production network safe! Production Network Security Audit We have a long experience in secure processes....

    Read more

  • Electricity network substation consulting service Save LAN Oy

    Communication solutions for the production network

    Make the production network safe! Production network communication solutions Save LAN offers modern and secure communication solutions...

    Read more

  • Scada system consulting Save LAN Oy Lauri Jurvanen

    SCADA consulting

    Make the production network safe! SCADA consulting We offer you a high level of expertise and professionalism...

    Read more

  • Information security mapping for the company Lauri Jurvanen Save lan

    Information security survey for the company

    Ensuring the security of your business A security assessment for your business A security assessment will go through all the...

    Read more

Questions about your company's security?

040 728 7636

Please be as specific as possible about your situation. I will reply to you by email promptly the same day 👍

Loading

Save LAN Oy

  • Rajatorpantie 8, 01600 Vantaa
  • 040 728 7636
  • Business ID: 3006557-7
  • lauri.jurvanen (at) savelan.fi

Services

  • Substation consulting
  • SCADA consulting
  • Process network risk analysis
  • Information security analysis of the production network
  • Communication solutions for the production network

Other links

  • A guide to secure business operations
  • Team
  • Give us a call
  • Register and Privacy Statement
  • Nematron® system
Trusted-Partner-Save Lan logo
AA credit rating Savelan Oy

© 2025 Save LAN

en_USEnglish
fiFinnish en_USEnglish
fi Finnish
fi Finnish
en_US English
  • NIS2 Directive
  • Services
    • Firewall service
    • Substation consulting
    • SCADA consulting
    • Process network risk analysis
    • Information security audit of the production network
    • Communication solutions for the production network
    • Information security survey for the company
  • Guides
    • What is an OT network? A guide to the world of production networks!
    • What is information security? A guide to secure business!
  • Customer cases
  • Blog
  • About us
  • Give us a call