Signature and Disaster Recovery. The Checksums plus Digital signatures in systems of critical configuration provide mechanisms used to detect the unauthorized changes in computer system. They identify the modified files. This makes it possible for the user to detect when there is a problem and is in a position to identify the altered files by intruders. (Ericsson

2010:1508).