Discussion Paper.
Data tampering has become a significant problem in the US and many other countries abroad. You can read an article here that discusses this in more detail:
Please answer the following questions in paragraph form only:
How does having proper permissions and correct access control lists in place help with reducing tampering threats for integrity?
How does the use of cryptographic mechanisms help with reducing tampering threats for integrity?
How does the use of logging technology and audit activities provide a deterrent when addressing issues related to tampering threats for integrity?