The thesis shows the use of message hash function for integrity attribute change identification in sensitive information asset. Changes introduced to file content may suggest confidentiality attribute violation. It has been verified in what way random changes introduced into file content affect function. The minor number of bytes changed in comparison to file size that was assumed, derives from potential benefits for the attacker. Large number of changes in the file may suggest the situation of encrypting it. Such an action leads to accessibility attribute violation
 International Standard ISO/IEC 27001:2005 Information technology – Security techniques – Information security management systems – Requirements, Geneva 2005.
 Jóźwiak I.J., Szleszyński A., Study of the security of process running in computer operating systems, Safety and Reliability: Methodology and Application, pp. 651 – 654, ESREL 2014, CRC Press, 2014.
 Liderman K., Information security, PWN, Warszawa 2012 (in polish language)
 RFC 1321, The MD-5 Message – Digest Algorithm, Network Working Group, (access on-line) www.rfc-editor.org, 1992.
 RFC 3874, A 224-bit One-way Hash Function: SHA-224, Network Working Group, (access on-line) www.rfc-editor.org, 2004.
 RFC 4270, Attack on Cryptographic Hashes in Internet Protocols, Network Working Group, (access on-line) www.rfc-editor.org, 2005.
 Stallings W., Operating System Internals and Design, Prentice Hall, Upper Sadle River, 2012.
 Szleszyński A., The Method of Evaluation Degree of Changes Confidentiality Attribute of Information Asset Inside ITC System, Journal of KONBiN 33(1), pp. 159 – 168, Warszawa 2015.
 Tanenbaum A., Boss H., Modern Operating Systems, Pearson Education, 2015.