From the course: Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 24,200 courses taught by industry experts.

Integrity

Integrity

- [Instructor] Let's take a little bit of a deeper dive into integrity. And we already kind of set the stage a few minutes ago when we talked about asymmetric cryptography, specifically the ideas of non-repudiation. So when we talk about integrity, we've got to realize that data can be modified two different ways. Data can be corrupted, or it can be intentionally modified through some sort of malicious activity. All right, so when we talk about data being corrupted, obviously, there's no mal-intent. It's just something that happens when there's interference or issues on the line. Sometimes things get modified. Packets get dropped, whatever. We said just a few minutes ago that a good defense in order to detect accidental modification is hashing. So hashing uses one-way math to determine a value for the message. The message is sent. Receiver does the same one-way math with their application. And if the two hashes match, then we know there's been no corruption. However, we know that a…

Contents