Unit 5 Lab: Using Hash Functions to Validate Data Integrity
Outcomes addressed in this activity:
Unit Outcomes:
- Collect volatile data in a text file.
- Practice commands helpful to the forensic examiner.
- Capture running RAM.
- Conduct a memory dump using Volatility.
Course Outcome:
IT411-3: Apply various types of forensic analysis tools for data recovery to forensic scenarios.
Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). There are many different types of hashing functions. For example, MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Different mathematical calculations result in stronger hash values. The strongest of these hash values listed is SHA-512, and the weakest is MD5. Although weaker than the others, the MD5 hash is still accepted in court for testimony. As the number of files continues to increase, larger hash values ensure even more reliability than older ones that were used.
Part 1 Lab: Using Hash Functions to Validate Data Integrity
Complete the lab “Using Hash Functions to Validate Data Integrity” in the InfoSec Learning (ISL) environment located in Unit 5. Completion is automatically graded and posted to the Gradebook entry for the lab.
Part 2 Assignment: Written Portion Requirements
There are five types of hashing algorithms. Write a 300-word explanation of each type of hashing algorithm.
The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.
For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.
Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.
Directions for Submitting Your Lab
The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in a Microsoft Word document, save it as a file entitled IT411_Unit5Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.
Attached Files (PDF/DOCX): Unit 5 Lab assignment.docx
Note: Content extraction from these files is restricted, please review them manually.

Leave a Reply
You must be logged in to post a comment.