Scan QR code or get instant email to install app
Question:
The most effective way to analyze the integrity of applications on a network and ensure that they are not tampered with or trojaned is to use cryptographic hashes.
Cryptographic hashes are a type of mathematical function that can be used to generate a unique fingerprint for any piece of data. This fingerprint is called a hash value. If the data is changed in any way, the hash value will also change.
To use cryptographic hashes to analyze application integrity, George would need to generate a hash value for each application that he wants to protect. He could then store these hash values in a secure location. To verify the integrity of an application, George would simply generate a new hash value for the application and compare it to the stored hash value. If the two hash values match, then the application has not been tampered with.
Comments