A company wants to ensure that the software it develops will not be tampered with after the final version is completed. Which of the following should the company most likely use?
A. Hashing:
Hashing is a technique used to generate a unique, fixed-size value (hash) based on the contents of a file, such as a software application. After the final version of the software is completed, the company can create a hash of the software file and store it securely. Whenever the software is accessed or distributed, the company can recalculate the hash and compare it to the original hash. If the hashes match, the file has not been tampered with. This provides a way to verify the integrity of the software and ensure that it has not been altered after the final version.
Why not C. Baselines:
Baselines refer to a set of standards or configurations for systems and software that are considered secure. While baselines can be useful for ensuring that systems meet security standards, they do not directly address ensuring that the software has not been tampered with after it is finalized. Baselines help with ongoing security practices rather than tamper detection.
C. Baselines refer to a reference point or a final version of a system or software that is used as a standard for comparison. Once a baseline is established, any changes to the software can be detected by comparing it against the baseline version. This is crucial for ensuring that the software has not been tampered with after the final version is completed. The baseline provides a known and trusted version of the software, making it easier to spot any unauthorized modifications or tampering.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
laternak26
4 weeks, 1 day ago3b1fd98
1 month, 1 week agojafyyy
4 months, 3 weeks agoqacollin
5 months ago