This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.
9.3.1 There is significant overlap between the general threats to the
confidentiality of information assets (as discussed at Section 8.4) and the threats
to the integrity of those assets. Threats that are specific to integrity relate to non-