GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and customer data are all potential targets of data corruption and destruction. A timely, accurate, and thorough detection and response to a loss of data integrity can save an organization time, money, and headaches. While human knowledge and expertise is an essential component of these tasks, the right tools and preparation are essential to minimizing downtime and losses due to  data integrity events.

The NCCoE, in collaboration with members of the business community and vendors of  cybersecurity solutions, has built an example solution to address these data integrity challenges. This project details methods and potential tool sets that can detect, mitigate, and contain data integrity events in the components of an enterprise network. It also identifies tools and strategies to aid in a security team’s response to such an event.


Interested in ransomware? Check out this GovWhitePapers blog post! You can also find ransomware events on our sister site, GovEvents.


  • Author(s):
  • Jennifer L. Cawthra
  • Michael R. Ekstrom
  • Lauren N. Lusty
  • Julian T. Sexton
  • John E. Sweetnam
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events
  • White Paper
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:December 8, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content