What is a hash in cybersecurity?

Back to top