This lesson discusses integrity which is the concept of detecting modifications to a network, be it intentional or unintentional (e.g. a file of corrupted across a link). Hashes are the tools used to detect unintentional modifications, also called a message digest. To detect intentional modification, Message Access Codes (or MACs) are used. The strongest method of detecting an intentional modification is with a digital signature.
In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.