Integrity, Authenticity, and Validity, Before & After a CyberAttack