https://www.yourcyberpath.com/85/
\n\nIn this episode, Kip and Jason discuss the second pillar of the CIA pentagram, Integrity.
\n\n\xa0The whole idea of integrity is making sure any entity that you interact with has not been modified after creation and exists where it needs to be.
\n\n\xa0Jason mentions how it's not always a perfect balance between all the pillars of the pentagram but depending on the real-world situation, the solution tends to lean towards one or more of the pillars.
\n\n\xa0Kip explains how digital signatures work and what are the best use cases for them, while Jason dives in deep explaining how hashes work and how to best utilize them.
\n\n\xa0Again, Kip and Jason go over some interview questions to give you an idea of what kind of questions you might encounter, and what a good answer sound like.
\n\n\xa0Jason then finalizes the episode with a great reminder to always make sure you to test restore backups every few weeks when setting up integrity and backups in your organization.
\n\nWhat You\u2019ll Learn
\n\n\u25cf\xa0\xa0\xa0\xa0\xa0What are some real-world examples of integrity?
\n\n\u25cf\xa0\xa0\xa0\xa0\xa0What is hashing? and how do we use it?
\n\n\u25cf\xa0\xa0\xa0\xa0What are digital signatures?
\n\n\u25cf\xa0\xa0\xa0\xa0How can you verify a file's integrity?
\n\nRelevant Websites For This Episode
\n\n\u25cf\xa0\xa0\xa0\xa0\xa0www.YourCyberPath.com
\n\nOther Relevant Episodes
\n\n\u25cf\xa0\xa0\xa0\xa0\xa0Episode 62 - The NIST Cybersecurity Framework
\n\n\u25cf\xa0\xa0\xa0\xa0\xa0 Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)