Which of the following is used to preserve integrity in software?
Encryption
Hashing
Recovery
Redundancy