What are methods to achieve integrity?
Hashing, Access Controls, Digital Signatures, Regular Audits, Checksums
Hashing
Converting data into a fixed-size value
Result of hashing function
Hash digest / digital fingerprint
Digital Signatures
Use encryption to ensure integrity and authenticity
How digital signatures work?
Data is hashed and then this hash digest is encrypted by user’s private key. Any alterations will change hash and invalidate digital signature
Checksums
Method to verify the integrity of data during transmission
How checksums works?
Sender and receiver should have the same checksum to ensure it is the same data
Access Controls
Ensures that only authorized individuals can modify data and reduce the risk of unintentional or malicious alterations
Regular Audits
Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed
What Integrity ensures about data?
It remains consistent, accurate and trustworthy through its lifecycle
What word is integrity linked with?
Hashing