Final answer:
B) Data corruption, Data processing integrity controls are designed to reduce data corruption by ensuring data accuracy and consistency throughout its lifecycle. They are not specifically designed to address unauthorized access, system crashes, or information overload.
Step-by-step explanation:
The data processing integrity controls are designed to reduce the threat of B) Data corruption. These controls ensure that data remains accurate, consistent, and as intended throughout its lifecycle, which includes input, processing, storage, and output stages. For instance, controls such as input validation checks help in preventing incorrect data from being entered into the system, while error detection and correction techniques help in maintaining the integrity of data during processing and storage.
Other threats such as A) Unauthorized access are typically addressed by access controls and authentication mechanisms rather than data processing integrity controls.
C) System crashes can be mitigated by reliable hardware, software fault tolerance, and rigorous testing, but these are not specifically related to data integrity. Lastly, D) Information overload is a separate issue that deals with the capacity of systems or individuals to process data, rather than the accuracy or integrity of the data itself.
Data processing integrity controls focus on ensuring the accuracy and reliability of data by preventing and detecting errors, corruption, or unauthorized alterations during processing. While unauthorized access (A) is typically addressed by access controls, system crashes (C) and information overload (D) are not directly mitigated by data processing integrity controls. The primary goal is to maintain the integrity of the data, safeguarding against unintended or malicious changes that could compromise the accuracy and reliability of the information.