When data confidentiality is compromised, the consequence to an enterprise is not always immediate but it can be costly. For example, if a hacker gains access to an organization's e-mail system, proprietary information that provides competitive advantage might be stolen resulting in a loss of research and development dollars spent in gaining that advantage. When data integrity is compromised, an organization must often incur prohibitive costs to correct the consequences of attacks. For instance, a malicious hacker might modify a Web site, replacing relevant information with nonsensical or offensive content. This compels the proprietor of the site to spend money not only to fix the.