Page 923 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 923

Checking the Hash



                  Checking the hash value of files is always a good idea. This simple
                  task can prevent the use of corrupted files and prevent the
                  accidental acceptance of maligned data. Several intrusion detection
                  systems (IDSs) and system integrity verification tools use hashing
                  as a means to check that files did not change over time. This is

                  done by creating a hash for every file on a drive, storing those
                  hashes in a database, and then periodically recalculating hashes for
                  files and checking the new hash against the historical one. If there
                  is ever any difference in the hashes, then you should investigate the
                  file.

                  Another common use of hashes is to verify downloads. Many
                  trusted internet download sites provide MD5 and SHA hash totals

                  for the files they offer. You can take advantage of these hashes in at
                  least two ways. First, you can use a download manager that
                  automatically checks the hashes for you upon download
                  completion. Second, you can obtain a hashing tool, such as
                  md5sum or sha1sum, to generate your own hash values. Then
                  manually compare your generated value from the downloaded file
                  against the claimed hash value from the download site. This

                  mechanism ensures that the file you ultimately have on your
                  system matches, to the last bit, the file from the download site.



               Record sequence checking is similar to a hash total check; however,
               instead of verifying content integrity, it verifies packet or message
               sequence integrity. Many communications services employ record
               sequence checking to verify that no portions of a message were lost
               and that all elements of the message are in their proper order.


               Transmission Mechanisms


               Transmission logging is a form of auditing focused on
               communications. Transmission logging records the particulars about
   918   919   920   921   922   923   924   925   926   927   928