You are a cybersecurity analyst at a financial institution that has recently experienced a targeted attack. Upon investigation, you discover that attackers have altered transaction records in your database. Which control type is most effective in ensuring the integrity of these records?
Implementing cryptographic methods such as hashing
The most effective control type for ensuring integrity in this scenario is the implementation of cryptographic methods. Data integrity ensures that data remains unaltered and authentic. Cryptographic controls, such as hashing, provide a way to verify that data has not been modified. Other potential controls like access control and logging play supportive roles in overall security but are not as direct in maintaining data integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are cryptographic methods and how do they work?