File integrity monitoring systems watch the file system of an endpoint or server for any unexpected changes and report those changes to an administrator for further investigation. In this video, Mike Chapple explains how file integrity monitoring systems
- [Presenter] File integrity monitoring…is an important component of a defense…in depth approach to information security.…We use many different defenses designed…to keep end point systems safe.…Anti-virus software is designed to detect malicious files…before they gain a foothold on end points.…Centralized, multi-factor authentication…prevents attempts to compromise user accounts.…Host intrusion detection and prevention systems…alert us to potential compromises and block them.…
However, the principle of defense in depth suggests…that we should have controls in place…that can help us detect an intrusion…even when those other systems might fail.…File integrity monitoring is a great example…of this type of control.…File integrity monitoring systems watch the file system…of an endpoint or server for any unexpected changes,…and then report those changes…to an administrator for further investigation.…They perform this function by using…cryptographic hash functions.…
Hash functions take an input of any size…and transform it into a unique, cryptographic hash value.…
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.