header bg

Scan QR code or get instant email to install app

Question:

George wants to protect the applications on his network from being tampered with or infected by trojans. What would be the MOST effective method for him to analyze the applications' integrity and achieve this goal?

A Use cryptographic hashes.
explanation

The most effective way to analyze the integrity of applications on a network and ensure that they are not tampered with or trojaned is to use cryptographic hashes.
Cryptographic hashes are a type of mathematical function that can be used to generate a unique fingerprint for any piece of data. This fingerprint is called a hash value. If the data is changed in any way, the hash value will also change.
To use cryptographic hashes to analyze application integrity, George would need to generate a hash value for each application that he wants to protect. He could then store these hash values in a secure location. To verify the integrity of an application, George would simply generate a new hash value for the application and compare it to the stored hash value. If the two hash values match, then the application has not been tampered with.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*