NCAE Mapping Hub
Security+ ยท 3.0 Security Architecture

Hashing

A one-way function producing a fixed-size digest from input. Cryptographically secure hashes (SHA-256, BLAKE2) are collision-resistant. MD5 and SHA-1 are broken and should not be used for security.

How this shows up at NCAE

File integrity monitoring uses hashing. Password storage uses hashing (with salts). The `md5sum` command on your baseline files, rerun later, shows what red team changed.