answersLogoWhite

0


Best Answer

One of two methods are commonly used to protect the integrity of a file on a computer system, redundancy and checksums.

Checksums involve computing a number that is a function of the file's content, such that different file content results in a different number. Corrupt data would lead to a number that does not match the one on record (a 'checksum mismatch'), thus allowing to detect the breach of data integrity.

Traditionally, such checksum algorithms used CRC-16 and sometimes even much weaker schemes, such as a simple XOR. Those simple algorithms do not always result in a different checksum when the input data changes; modern applications and new design will probably prefer stronger algorithms such as SHA-2.

Redundancy involves maintaining one or more copies of the same file. A breach of data integrity can be detected by comparing those copies, on the assumption that not all will suffer from an error at the same time.

In practical solutions, systems typically use a combination of both. For example, if the comparison detects an integrity breach in a redundant system, the checksums can help decide which one of the copies is good and which is bad, thus fix the error rather than just detect it.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Suggest methods of protecting the integrity of a file?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

If a server stores data files for users to access it is commonly called a?

If a server stores data files for users to access, it is commonly called a file server. File servers are used to centralize and manage files and data for a group of users within an organization or network. Users can access the files stored on the file server using a variety of methods, such as a shared folder, FTP, or a web-based interface. File servers can be configured with different levels of security and access control, depending on the needs of the organization. Additionally, file servers may also provide features such as file versioning and backup to help ensure the integrity and availability of the stored data.


The comparison Between RDBMS and conventional File System?

file system is based on ISAM. It takes time to search a data in a file (table). It is very difficult to maintain physical refrential integrity. It's not an easy talk to patition or scale out a database. RDBMS is quite wide concept. Everything is under one logical box. We can maitain data integrity, reduce the redundancy and increase the consistency of the data. It is very easy to maintain the data and scale out it.


Disadvantages of file system?

Traditional file processing system lacks from DBMS in many ways . Major Disadvantage of FPS are it do not maintains data security and integrity efficiently.


What are the Problems of traditional file processing?

Program-Data Dependence. File descriptions are stored within each application program that accesses a given file.Duplication of Data. Applications are developed independently in file processing systems leading to unplanned duplicate files. Duplication is wasteful as it requires additional storage space and changes in one file must be made manually in all files. This also results in loss of data integrity. It is also possible that the same data item may have different names in different files, or the same name may be used for different data items in different files.Limited data sharing. Each application has its own private files with little opportunity to share data outside their own applications. A requested report may require data from several incompatible files in separate systems.Lengthy Development Times. There is little opportunity to leverage previous development efforts. Each new application requires the developer to start from scratch by designing new file formats and descriptionsExcessive Program Maintenance. The preceding factors create a heavy program maintenance load.Integrity Problem. The problem of integrity is the problem of ensuring that the data in the database is accentuate.


What is security of files?

Security normally refers to Confidentiality, Integrity and Availability.Briefly, your files must be:accessible: only to the persons and applications you authorize, and with the minimum privilege required (if a user has only the need to read a file, he/she MUST NOT have the right to modify or delete it);modifiable: only by users or applications authorized to do so;available: when the authorized users need to access them: a file is useless if it not available when you need it.Additionally, there are a couple of additional related aspects that are:authenticity: the files must be attributable without doubts to the creator;non-repudiation: the creator of the file must not be able to disavow the files he/she has created.

Related questions

What Two ways of protecting the integrity of files?

check file fixity if it has been provided with the contents


How do you fix file integrity error?

How to Fix file integrity violated Error


How do you check integrity of a file you have downloaded?

You are not free to chose the method of integrity check, because file integrity checks are two-step processes: First, the original owner of a file computes an integrity fingerprint. An MD5 signature is a popular choice, but many other suitable methods are available an in use. The resulting signature is the communicated with you, often not as part of the file itself (embedding the signature requires additional steps to prevent someone from modifying the file and re-signing). Second, you receive file and integrity checksum. At this point, you have no choice regarding the integrity method; you must use whichever method the originator chose. The originator will typically be able to advise on freely available tools, or supply such a tool, to perform the integrity checks with the chosen algorithms and attributes.


How do you check the integrity of a file you have downloaded?

You are not free to chose the method of integrity check, because file integrity checks are two-step processes: First, the original owner of a file computes an integrity fingerprint. An MD5 signature is a popular choice, but many other suitable methods are available an in use. The resulting signature is the communicated with you, often not as part of the file itself (embedding the signature requires additional steps to prevent someone from modifying the file and re-signing). Second, you receive file and integrity checksum. At this point, you have no choice regarding the integrity method; you must use whichever method the originator chose. The originator will typically be able to advise on freely available tools, or supply such a tool, to perform the integrity checks with the chosen algorithms and attributes.


How do you check the integrity of an ISO file?

To check the integrity of the an ISO file you will need to open command prompt. Once in command prompt type in: c:\> fciv , and the iso file name.


How do you check that some time before which file open in my computer?

Ahave swich my file open my computer becorse i protecting file.


In the File Integrity Monitor of Policy Auditor you can retain up to how many versions including the baseline version of the file?

Six


What is expansion for asmx file?

ASMX file is a webservice file. It stands for 'Active Server Methods Extension'.


What are the methods of file security?

Encryption is the best.


What is the functions of file class?

file class contain methods or functions that handle various file stream operations.


What are dis advantage of file systems?

FPS is File processing system that was used earlier. There are certain limitation in FPS like no security, no integrity.


Can you change the action of an acoustic guitar?

Yes, but it involves adjusting what I call the "bridge nut" on some of these you have to file them down, and on others you can adjust through a variety of methods from the inside. I suggest having a professional look at it.