... 70What Are We Trying to Prevent? • Chapter 2 71means, at the very least, user files are at risk.The second point of the CIA triad isintegrity, and it’s a crucial breakdown in information integrity. ... analysis.■To prepare for a civil or criminal action (including a personnel action).These require a careful handling of evidence, and correspondingly, a moreexpensive and time-consuming response ... this in a timely fashion, unfortunately. For thethreats of malware, removing the software or using antivirus software isusually the best approach. For network- based threats, reconfiguring theperimeter...