What hashing algorithm is recommended for the protection of sensitive information?

Encryption is a critical part of modern computer security. Encryption algorithms like AES 256 and PGP are used to scramble data while in transit and unscramble it when it reaches the legitimate destination. But what happens when you need to scramble data in a way that’s impossible to unscramble? That’s where hashing comes in. This article will examine SHA-256, a widely used hash function, and its role in contemporary cybersecurity.

Show

Related Product

N‑sight RMM

Get up and running quickly with RMM designed for smaller MSPs and IT departments.

What is SHA-256?

The SHA-256 algorithm is one flavor of SHA-2 (Secure Hash Algorithm 2), which was created by the National Security Agency in 2001 as a successor to SHA-1. SHA-256 is a patented cryptographic hash function that outputs a value that is 256 bits long.

What is hashing? In encryption, data is transformed into a secure format that is unreadable unless the recipient has a key. In its encrypted form, the data may be of unlimited size, often just as long as when unencrypted. In hashing, by contrast, data of arbitrary size is mapped to data of fixed size. For example, a 512-bit string of data would be transformed into a 256-bit string through SHA-256 hashing.

In cryptographic hashing, the hashed data is modified in a way that makes it completely unreadable. It would be virtually impossible to convert the 256-bit hash mentioned above back to its original 512-bit form. So why would you want to create a scrambled message that can’t be recovered? The most common reason is to verify the content of data that must be kept secret. For example, hashing is used to verify the integrity of secure messages and files. The hash code of a secure file can be posted publicly so users who download the file can confirm they have an authentic version without the contents of the file being revealed. Hashes are similarly used to verify digital signatures.

Password verification is a particularly important application for cryptographic hashing. Storing users’ passwords in a plain-text document is a recipe for disaster; any hacker that manages to access the document would discover a treasure trove of unprotected passwords. That’s why it’s more secure to store the hash values of passwords instead. When a user enters a password, the hash value is calculated and then compared with the table. If it matches one of the saved hashes, it’s a valid password and the user can be permitted access.

What role does SHA-256 hashing play in cybersecurity? SHA-256 is used in some of the most popular authentication and encryption protocols, including SSL, TLS, IPsec, SSH, and PGP. In Unix and Linux, SHA-256 is used for secure password hashing. Cryptocurrencies such as Bitcoin use SHA-256 for verifying transactions.

How secure is SHA-256?

SHA-256 is one of the most secure hashing functions on the market. The US government requires its agencies to protect certain sensitive information using SHA-256. While the exact details of how SHA-256 works are classified, we know that it is built with a Merkle-Damgård structure derived from a one-way compression function itself created with the Davies-Meyer structure from a specialized block cipher.

Three properties make SHA-256 this secure. First, it is almost impossible to reconstruct the initial data from the hash value. A brute-force attack would need to make 2256 attempts to generate the initial data. Second, having two messages with the same hash value (called a collision) is extremely unlikely. With 2256 possible hash values (more than the number of atoms in the known universe), the likelihood of two being the same is infinitesimally, unimaginably small. Finally, a minor change to the original data alters the hash value so much that it’s not apparent the new hash value is derived from similar data; this is known as the avalanche effect.

Interested in learning more about how to securely back up your servers and critical applications? Explore our product suite to see how you can be prepared for potential disasters.

Last Updated on October 18, 2019 by

  1. What is an example of early warning systems that can be used to thwart cybercriminals?

    • CVE database
    • Infragard
    • ISO/IEC 27000 program
    • Honeynet project

      Explanation:

  2. Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need for cybersecurity specialists? (Choose two.)

    • They require 24-hour monitoring.
    • They collect sensitive information.
    • They contain personal information.
    • They increase processing requirements.
    • They require more equipment.
    • They make systems more complicated.

      Explanation:

  3. Which two groups of people are considered internal attackers? (Choose two.)

    • ex-employees
    • amateurs
    • black hat hackers
    • hacktivists
    • trusted partners

      Explanation:

  4. Which methods can be used to implement multifactor authentication?

    • IDS and IPS
    • tokens and hashes
    • VPNs and VLANs
    • passwords and fingerprints

      Explanation:

  5. Which technology should be used to enforce the security policy that a computing device must be checked against the latest antivirus update before the device is allowed to connect to the campus network?

    • NAC
    • VPN
    • SAN
    • NAS

      Explanation:

  6. A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective?

    • Implement a firewall.
    • Implement intrusion detection systems.
    • Implement a VLAN.
    • Implement RAID.

      Explanation:

  7. Which technology can be used to ensure data confidentiality?

    • hashing
    • identity management
    • RAID
    • encryption

      Explanation:

  8. An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?

    • VPN
    • VLANS
    • RAID
    • SHS

      Explanation:

  9. What are the two most effective ways to defend against malware? (Choose two.)

    • Implement a VPN.
    • Implement strong passwords.
    • Install and update antivirus software.
    • Implement RAID.
    • Implement network firewalls.
    • Update the operating system and other application software.

      Explanation:

  10. An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario?

    • familiarity
    • intimidation
    • trusted partners
    • urgency

      Explanation:

  11. Which statement describes a distributed denial of service attack?”

    • An attacker sends an enormous quantity of data that a server cannot handle.
    • An attacker views network traffic to learn authentication credentials.
    • An attacker builds a botnet comprised of zombies.
    • One computer accepts data packets based on the MAC address of another computer.

      Explanation:

  12. What type of attack will make illegitimate websites higher in a web search result list?

    • DNS poisoning
    • browser hijacker
    • spam
    • SEO poisoning

      Explanation:

  13. What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?

    • man-in-the-middle
    • social engineering
    • pharming
    • ransomeware

      Explanation:

  14. A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

    • Look for usernames that do not have passwords.
    • Look for unauthorized accounts.
    • Look for policy changes in Event Viewer.
    • Scan the systems for viruses.

      Explanation:

  15. Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?

    • DoS attack
    • Trojan horse
    • ransomeware
    • man-in-the-middle attack

      Explanation:

  16. A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement?

    • RSA
    • Diffie-Hellman
    • 3DES
    • ECC

      Explanation:

  17. What happens as the key length increases in an encryption application?

    • Keyspace decreases exponentially.
    • Keyspace increases exponentially.
    • Keyspace decreases proportionally.
    • Keyspace increases proportionally.

      Explanation:

  18. Which algorithm will Windows use by default when a user intends to encrypt files and folders in an NTFS volume?

    • RSA
    • DES
    • AES
    • 3DES

      Explanation:

  19. Before data is sent out for analysis, which technique can be used to replace sensitive data in nonproduction environments to protect the underlying information?

    • data masking substitution
    • steganography
    • software obfuscation
    • steganalysis

      Explanation:

  20. In which situation would a detective control be warranted?

    • when the organization needs to repair damage
    • after the organization has experienced a breach in order to restore everything back to a normal state
    • when the organization needs to look for prohibited activity
    • when the organization cannot use a guard dog, so it is necessary to consider an alternative

      Explanation:

  21. An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?

    • administrative
    • technological
    • physical
    • logical

      Explanation:

  22. An organization has implemented antivirus software. What type of security control did the company implement?

    • deterrent control
    • detective control
    • recovery control
    • compensative control

      Explanation:

  23. Passwords, passphrases, and PINs are examples of which security term?

    • authorization
    • access
    • authentication
    • identification

      Explanation:

  24. An organization has determined that an employee has been cracking passwords on administrative accounts in order to access very sensitive payroll information. Which tools would you look for on the system of the employee? (Choose three)

    • password digest
    • reverse lookup tables
    • lookup tables
    • rouge access points
    • algorithm tables
    • rainbow tables

      Explanation:

  25. What technique creates different hashes for the same password?

    • SHA-256
    • HMAC
    • CRC
    • salting

      Explanation:

  26. Which hashing technology requires keys to be exchanged?

    • HMAC
    • salting
    • MD5
    • AES

      Explanation:

  27. You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?

    • SHA-1
    • AES
    • MD5
    • SHA-256

      Explanation:

  28. What kind of integrity does a database have when all its rows have a unique identifier called a primary key?

    • entity integrity
    • referential integrity
    • domain integrity
    • user-defined integrity

      Explanation:

  29. Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.)

    • The systems use different hashing algorithms.
    • Both systems use MD5.
    • Both systems scramble the passwords before hashing.
    • One system uses hashing and the other uses hashing and salting.
    • One system uses symmetrical hashing and the other uses asymmetrical hashing.

      Explanation:

  30. Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?

    • public key from Bob
    • private key from Alice
    • private key from Bob
    • username and password from Alice

      Explanation:

  31. The X.509 standards defines which security technology?

    • digital certificates
    • security tokens
    • strong passwords
    • biometrics

      Explanation:

  32. What is it called when an organization only installs applications that meet its guidelines, and administrators increase security by eliminating all other applications?

    • asset standardization
    • asset identification
    • asset classification
    • asset availability

      Explanation:

  33. Being able to maintain availability during disruptive events describes which of the principles of high availability?

    • single point of failure
    • system resiliency
    • fault tolerance
    • uninterruptible services

      Explanation:

  34. An organization has recently adopted a five nines program for two critical database servers. What type of controls will this involve?

    • stronger encryption systems
    • remote access to thousands of external users
    • limiting access to the data on these systems
    • improving reliability and uptime of the servers

      Explanation:

  35. What approach to availability provides the most comprehensive protection because multiple defenses coordinate together to prevent attacks?

    • layering
    • obscurity
    • diversity
    • limiting

      Explanation:

  36. The team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy?

    • qualitative analysis
    • loss analysis
    • protection analysis
    • quantitative analysis

      Explanation:

  37. Which two values are required to calculate annual loss expectancy? (Choose two.)

    • asset value
    • exposure factor
    • frequency factor
    • annual rate of occurrence
    • single loss expectancy
    • quantitative loss value

      Explanation:

    • asset identification
    • asset availability
    • asset standardization
    • asset classification

      Explanation:

  38. What approach to availability involves using file permissions?

    • layering
    • simplicity
    • obscurity
    • limiting

      Explanation:

  39. What are two incident response phases? (Choose two.)

    • prevention and containment
    • containment and recovery
    • mitigation and acceptance
    • detection and analysis
    • risk analysis and high availability
    • confidentiality and eradication

      Explanation:

  40. What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

    • Local Security Policy tool
    • Event Viewer security log
    • Active Directory Security tool
    • Computer Management

      Explanation:

  41. In a comparison of biometric systems, what is the crossover error rate?

    • rate of false negatives and rate of false positives
    • rate of false positives and rate of acceptability
    • rate of rejection and rate of false negatives
    • rate of acceptability and rate of false negatives

      Explanation:

  42. What describes the protection provided by a fence that is 1 meter in height?

    • It deters casual trespassers only.
    • The fence deters determined intruders.
    • It offers limited delay to a determined intruder.
    • It prevents casual trespassers because of its height.

      Explanation:

  43. Mutual authentication can prevent which type of attack?

    • wireless poisoning
    • man-in-the-middle
    • wireless sniffing
    • wireless IP spoofing

      Explanation:

  44. Which protocol would be used to provide security for employees that access systems remotely from home?

    • SSH
    • WPA
    • Telnet
    • SCP

      Explanation:

  45. Which technology can be used to protect VoIP against eavesdropping?

    • encrypted voice messages
    • strong authentication
    • SSH
    • ARP

      Explanation:

  46. Which three protocols can use Advanced Encryption Standard (AES)? (Choose three.)

    • WPA
    • 802.11q
    • 802.11i
    • TKIP
    • WPA2
    • WEP

      Explanation:

  47. HVAC, water system, and fire systems fall under which of the cybersecurity domains?

    • network
    • user
    • device
    • physical facilities

      Explanation:

  48. Which national resource was developed as a result of a U.S. Executive Order after a ten-month collaborative study involving over 3,000 security professionals?

    • ISO OSI model
    • NIST Framework
    • ISO/IEC 27000
    • the National Vulnerability Database (NVD)

      Explanation:

  49. Which cybersecurity weapon scans for use of default passwords, missing patches, open ports, misconfigurations, and active IP addresses?

    • packet sniffers
    • vulnerability scanners
    • password crackers
    • packet analyzers

      Explanation:

SHA-1 and SHA-2 are the Secure Hash Algorithms required by law for use in certain U.S. Government applications, including use within other cryptographic algorithms and protocols, for the protection of sensitive unclassified information.

Which technology can be used to ensure data confidentiality?

Data Encryption Encryption is viewed as one of the most reliable ways to keep your data confidential at rest, in transit, or when processing real-time analytics. Data encryption uses algorithms to encode data into an unreadable format that needs an authorized key for decryption.

Which technology should be used to enforce the security policy?

Answer: NAC(Network Access Control ), The security regulation that requires a computer to be up to date on its antivirus software before being permitted to join to the campus network is enforced through the deployment of network access control technologies.

What are two methods that ensure confidentiality choose two?

Data encryption is a common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factor authentication is becoming the norm. Other options include biometric verification and security tokens, key fobs or soft tokens.