Ways Data Integrity Can Be Compromised