Excuse me, could you elaborate on the role of the hash function in the realm of network security? How does it contribute to ensuring the integrity and security of data as it traverses various systems and networks? What are the key properties that make hash functions indispensable in safeguarding against unauthorized access or tampering?