A financial institution has reported a significant discrepancy in its transaction records, indicating possible unauthorized modifications. Which control should be prioritized to verify and safeguard the integrity of these records?
Encrypt all transaction data to prevent unauthorized access.
Implement cryptographic hash functions to compare current records against trusted hash values.
Perform regular backups of the transaction records.
Establish strict access control lists for all financial records.
Data integrity can be ensured by using cryptographic hash functions to compute a unique hash value for each record. Any modification to a record would result in a different hash, thus detecting unauthorized changes. Access control lists help regulate who can modify data, but do not detect changes. Regular backups are necessary for data recovery, not for integrity checking. Encrypting data secures it from unauthorized access but does not cover integrity checks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic hash function?
Open an interactive chat with Bash
Why are hash functions preferred over encryption for data integrity verification?
Open an interactive chat with Bash
How do hash functions detect unauthorized changes in data?