File Integrity Verification: Using SHA-256 to Detect Tampering