Image

Alice will transmit a map to Bob. This map will indicate a secret location where they are to meet, exactly at 1:00pm.The more sensitive something is the more accuracy and precision matter. We’re going to ever-so-slightly change the message to prove a point:
Alice will transmit a map to Bob. This map will indicate a secret location where they are to meet exactly at 1:00pm.Notice the difference? The first message has a comma before "exactly" – the second doesn’t. Doesn’t really change the message… or does it? If you’ve ever heard of “hashing” or a “hash function,” such as a “checksum,” you know exactly where we are going. A hash function is a means of taking some input data and running it through some function to generate an output string of what, on the surface, is meaningless. From that output string (which looks meaningless), it is virtually impossible to reconstruct the original message. But here is the benefit of hash functions: you can compare them. That means if you’re worried about the integrity of the data, there are means to ensure the data doesn’t get monkeyed with, whether it is in transit or in storage. You just have to compare the hash functions. So, let’s run the two messages through a SHA256 hash converter and see what we get.
Message 1: b0c27394946aeebf9d912c622e077ec7899645a499f726a71d6ba76490111151 Message 2: 97923aa6aab501a2a6e1c3175c77c33ef4064addfa25419315b8d4d79c7cc8d9Amazing what one single comma can change, huh? Sure, in this message is probably didn’t make much of a difference but in certain cases, yeah, it can make a difference, even a life or death one depending on the value of the data where accuracy and precision are absolutely necessary. And this is just one of the ways to ensure data integrity. As we’ve noted in the past, encryption done right can solve a lot of your problems, especially – and you’ll love this if you didn’t know it already – you can run the encryption through a hash function. Just remember, though, that encryption on its own does not necessarily provide data integrity. The file could get corrupted or somebody still may be able to key the encryption key, alter the data, and send you what you believe to be something genuine. This is why timestamps and reviewing the metadata are integral pieces to the overall data integrity issue. There are other tactics, also. Some are very routine such as data backups, maintenance and audit, whereas others like blockchain and tokenization are a bit more complicated. We’ll talk about many of these in the follow-up piece to this article. Admittedly, the data integrity issue can get confusing as different techniques have different strengths and weaknesses. And often, you’ll see some sort of mix of tactics to ensure data integrity. Regardless, it’s an important issue to keep an eye on because of that entire confidence thing we talked about earlier. Without confidence, we’re going to run into a lot of problems that will not be easy to untangle. And that untangling will be mega-expensive. So, just remember – protecting your data is more than just preventing it from being stolen. It’s about your data not being monkeyed with. A bunch of ransomware attacks can get costly, but no single ransomware is going to bring down an enterprise. Get enterprises to waste their time with bogus data over time, and you’ll be seeing an “Out of Business” sign on their doors, something that the real Dr. Evils have figured out. This is why data integrity is the next big challenge that we see. Long term, this monkeying of data is a serious way to hurt an economy… and the national security of a country. Remember, it’s the economy, stupid. Don’t let anybody tell you otherwise.
Image
