Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson discusses integrity which is the concept of detecting modifications to a network, be it intentional or unintentional (e.g. a file of corrupted across a link). Hashes are the tools used to detect unintentional modifications, also called a message digest. To detect intentional modification, Message Access Codes (or MACs) are used. The strongest method of detecting an intentional modification is with a digital signature.