Meeting which of the following security objectives BEST ensures that information is protected against unauthorized modification?