Watch this video on YouTube
Alice, a cybersecurity analyst, receives a report that several files on her company's server have been modified without authorization. What principle of cybersecurity is primarily being violated in this scenario?