Information has
integrity. When it is exposed to damage, corruption, destruction, or other disruptions that hinders its authentic state, data integrity is threatened. Corruption can occur in many ways especially when information is being transmitted. To assure integrity, it is important to consider file hashing