💻
Database Magazine
GlossaryBest Practices and TipsFAQsResources
  • Database Magazine
  • Glossary of Terms
    • A
      • Archive
      • Active backup for Office 365
      • AWS Backup
      • Active Directory
      • Agent
      • Anti-ransomware solutions
    • B
      • Backup
      • Backup and Recovery
      • Backup as a service
      • Bare-metal backup
      • Backup repository
      • Backup schedule
      • Backup Solutions
      • Business Continuity
    • C
      • Cloud Backup
      • Continuous Data Protection (CDP)
      • Compression
      • Consistency check
      • Cold Backup
      • Cloud Data Management (CDM)
    • D
      • Data Deduplication
      • Disaster Recovery (DR)
      • Differential Backup
      • Disk-to-Disk (D2D) Backup
      • Disaster Recovery (DR)
    • E
      • Encryption
      • Endpoint Backup
      • Erasure Coding
      • Export/Import
      • Enterprise Backup Software
    • F
      • Full Backup
      • Failover
      • File-Level Backup
      • File Sync and Share
      • Fireproof and Waterproof Storage
    • G
      • Grandfather-Father-Son (GFS)
      • Granular Recovery
      • Geographically Dispersed Backup
      • Ghost Imaging
      • Global Deduplication
    • H
      • Hybrid Backup
      • Hot Backup
      • High Availability (HA)
      • Hard Disk Drive (HDD)
      • Hybrid Cloud Backup
    • I
      • Incremental Backup
      • Image-based Backup
      • Instant Recovery
      • Integrity Check
      • Infrastructure as a Service (IaaS)
    • J
      • Journaling
      • Job Scheduler
      • Just-in-Time Recovery
      • Journal-Based Recovery
      • Jumbo Frames
    • K
      • Key Management
      • Kernel-Based Recovery
      • Kickstart
      • Kept Versions
      • Kill Switch
    • L
      • Long-Term Retention
      • Log-Based Recovery
      • Local Backup
      • Latency
      • Load Balancing
    • M
      • Metadata
      • Mirroring
      • Multi-Site Replication
      • Media Rotation
      • Mounting
    • N
      • Nearline Storage
      • Network-Attached Storage (NAS)
      • Non-Destructive Recovery
    • O
      • Offsite Backup
      • Online Backup
      • Object Storage
      • Offsite Replication
      • Open File Backup
      • Overwrite Protection
      • One-Click Restore
    • P
      • Point-in-Time Recovery
      • Primary Storage
      • Physical Backup
      • Private Cloud Backup
      • P2V (Physical-to-Virtual) Conversion
    • Q
      • Quiesce
      • Quick Recovery
      • Quota Management
      • Quality of Service (QoS)
      • Query-Based Recovery
    • R
      • Recovery Point Objective (RPO)
      • Recovery Time Objective (RTO)
      • Replication
      • Restore
      • Retention Policy
    • S
      • Snapshot
      • Storage Area Network (SAN)
      • Secondary Storage
      • Single Point of Failure (SPOF)
      • Synthetic Full Backup
    • T
      • Tape Backup
      • Two-Factor Authentication (2FA)
      • Thin Provisioning
      • Test Restore
      • Transaction Log
    • U
      • Universal Restore
    • V
      • Versioning
      • Virtual Machine (VM) Backup
      • Verification
      • Vaulting
      • Virtual Tape Library (VTL)
    • W
      • Warm Site
      • Workload Mobility
      • WAN Acceleration
      • Write-Once, Read-Many (WORM)
      • Windows Backup
    • X
      • XOR (Exclusive OR)
    • Y
      • Yearly Backup
    • Z
      • Zero Data Loss
  • Best Practices and Tips
    • How to backup Microsoft 365 using third-party backup tools
  • FAQs
    • Does Office 365 have backups?
    • What is the best backup for Office 365?
    • How do I backup my Office 365 backup?
    • What is the backup tool for Office 365?
    • Does Office 365 have storage?
    • Is OneDrive a reliable backup solution?
    • What is an Incremental Backup?
    • Does VMware have a backup tool?
    • What is VMware considered backup?
    • What are the types of backup in VMware?
    • Is VMware snapshot a backup?
    • What is the best way to backup a Hyper-V VM?
    • How do I create a backup in Hyper-V?
    • Should you backup a Hyper-V host?
    • What is the difference between Hyper-V snapshot and backup?
    • What is the disaster recovery in IT industry?
    • What should an IT disaster recovery plan include?
    • What are the main steps in IT disaster recovery?
    • What is the difference between IT security and disaster recovery?
    • What is a NAS backup?
    • How do I backup my NAS data?
    • Can NAS be used as a backup?
    • What is Nutanix used for?
    • What is Nutanix storage?
    • What is RPO and RTO in Nutanix?
    • What is MSP backup?
    • What is managed backup service?
    • How do I restore my MSP backup?
    • What is Azure Backup?
    • What is the purpose of Azure Backup?
    • What are the different types of Azure cloud backups?
    • Is Azure Backup a PaaS?
    • What are the downsides of Backblaze?
    • Does Backblaze backup everything?
    • Is Backblaze better than Google Drive?
  • Resources
Powered by GitBook
On this page
  • Definition
  • Explanation
  • Related terms
  1. Glossary of Terms
  2. I

Integrity Check

Learn about integrity checks, a crucial process for ensuring data reliability, accuracy, and consistency.

Definition

Integrity Check, also known as Data Integrity Check, is a process or mechanism that verifies the consistency, accuracy, and reliability of stored data. It ensures that data remains intact and uncorrupted during storage, transfer, or retrieval operations.

Explanation

Integrity Checks are performed to detect and prevent data corruption, errors, or unauthorized modifications that can compromise the accuracy and reliability of stored information. By verifying the integrity of data, organizations can ensure the trustworthiness and usability of their critical information assets.

Here's how Integrity Checks typically work:

  1. Checksum or Hash Calculation: Integrity Checks often involve the calculation of checksums or hashes, which are unique values computed from the data using mathematical algorithms. These values act as digital fingerprints of the data, representing its content in a condensed form.

  2. Comparison: During an Integrity Check, the calculated checksum or hash value is compared against a previously known or expected value. If the values match, the data is considered to be intact and uncorrupted. Any discrepancies or differences indicate potential data corruption or modifications.

  3. Verification Mechanisms: Integrity Checks can be performed using various mechanisms, such as cyclic redundancy checks (CRC), message digests (e.g., MD5, SHA-256), or other error-detection codes. These mechanisms provide a way to detect changes in data, even if they are minimal.

  4. Periodic or Continuous Checks: Integrity Checks can be performed periodically or continuously, depending on the requirements and criticality of the data. Periodic checks involve validating data at specific intervals, while continuous checks can be implemented in real-time as data is accessed or modified.

Benefits of Integrity Checks include:

  • Data Reliability: Integrity Checks help ensure the reliability and trustworthiness of stored data. By verifying data integrity, organizations can have confidence in the accuracy and consistency of their information.

  • Early Detection of Data Corruption: Integrity Checks enable the early detection of data corruption or unauthorized modifications. This allows for prompt action to be taken, such as restoring from backups or repairing the affected data.

  • Data Validation: Integrity Checks provide a means to validate the integrity of data during storage, transfer, or retrieval processes. This validation ensures that data remains intact and unaltered throughout its lifecycle.

  • Compliance and Security: Integrity Checks are often essential for regulatory compliance and security requirements. They help maintain data integrity, preventing unauthorized changes or tampering that could lead to compliance violations or security breaches.

Related terms

  • Data Validation: Data Validation refers to the process of verifying the accuracy, completeness, and consistency of data. Integrity Checks can be considered as a form of data validation, focusing specifically on data integrity.

  • Error Detection and Correction (EDAC): Error Detection and Correction mechanisms are techniques used to identify and correct errors or inconsistencies in data. Integrity Checks can be seen as a form of EDAC, focusing on the detection of data corruption or modifications.

  • Checksum: A Checksum is a calculated value derived from data using mathematical algorithms. It acts as a unique identifier or digital fingerprint of the data and is commonly used in Integrity Checks.

  • Hash Function: A Hash Function is a mathematical algorithm that transforms data into a fixed-size value or hash code. Hash functions are often used in Integrity Checks to calculate hashes for data verification.

  • Bit Rot: Bit Rot, also known as data decay or data rot, refers to the gradual decay or corruption of stored data over time. Integrity Checks help detect and prevent bit rot by identifying data inconsistencies or corruption.

Implementing integrity checks as part of a robust data protection strategy is essential for organizations to maintain the integrity, accuracy, and trustworthiness of their critical data assets. By performing regular integrity checks, organizations can identify data corruption or unauthorized modifications and take appropriate actions to preserve data accuracy and reliability.

PreviousInstant RecoveryNextInfrastructure as a Service (IaaS)

Last updated 1 year ago