SOC Experts Community - Beta
0 like 0 dislike
36 views
in Security Concepts by (5.9k points)

2 Answers

0 like 0 dislike
by (2k points)
  • A unique string for a file or message generated by different algorithms like MD5,SHA etc.,
  • It is used in network communication or data transfer to check if the received file or message is tampered (If tampered HASH value will change)
Example Scenario :
  • Sender : Transfers a FILE to receiver with hash value : 56789 and sends the HASH to receiver
  • Receiver : Downloads the FILE received and calculates it's HASH value, if it matches with 56789 then it can be confirmed as original file which is not tampered.
0 like 0 dislike
by
Hash value is a set of numbers alphabets or the symbols generated in order to protect the file or the data, that is in order to see whether the data is tampered or not (hash value can be used to determine whether the data is altered or not)

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses

Categories

...