header bg


Confidentiality, integrity, and availability are all security components. Which technique ensures integrity?

A Hashing

A hash is a one-of-a-kind numerical string generated by a hashing algorithm on a given piece of data and used to verify data integrity. Hashes are commonly used to verify the integrity of files after download (compared to the hash value on the site before download) and/or to accumulate password values. A one-way algorithm generates hashes.