From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Conduct file integrity checking
From the course: Performing a Technical Security Audit and Assessment
Conduct file integrity checking
- There are many types of files that should only change under specific authorized circumstances. For instance, entries in an accounting ledger program should only be changed by members of the accounting team when they are making valid business updates. While most file changes are a part of doing business, some can be malicious, such as when someone deliberately manipulates or destroys file data. File changes can also be an indication of malware, since certain viruses will make changes to system or configuration files. In addition, file changes can be accidental in cases of human error or data corruption. For any of these scenarios, an organization would want to know if and when data is changing in sensitive or important files without proper authorization. That's where file integrity checking comes in. The best way to check file integrity is by using software which can hash files. Hashing is a form of encryption which takes a digital fingerprint, or checksum, of a file and its…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Required skillsets2m 52s
-
(Locked)
Conduct documentation reviews2m 8s
-
(Locked)
Conduct log reviews3m 4s
-
(Locked)
Conduct ruleset reviews2m 57s
-
(Locked)
Conduct system configuration reviews3m 35s
-
(Locked)
Conduct network sniffing1m 43s
-
(Locked)
Network sniffing tool demo: Wireshark3m 21s
-
(Locked)
Conduct file integrity checking4m 55s
-
(Locked)
File integrity checking tool demo1m 18s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews3m 9s
-
-
-
-
-
-
-