header bg

Scan QR code or get instant email to install app


Confidentiality, integrity, and availability are all security components. Which technique ensures integrity?

A Hashing

A hash is a one-of-a-kind numerical string generated by a hashing algorithm on a given piece of data and used to verify data integrity. Hashes are commonly used to verify the integrity of files after download (compared to the hash value on the site before download) and/or to accumulate password values. A one-way algorithm generates hashes.

Related Information