课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

File integrity monitoring

File integrity monitoring

- [Instructor] File integrity monitoring is an important component of a defense in-depth approach to cybersecurity. We have many different defenses designed to keep our endpoint systems safe. Antivirus software is designed to detect malicious files before they gain a foothold on endpoints. Centralized multi-factor authentication prevents attempts to compromise user accounts. Host intrusion detection and prevention systems alert us to potential compromises and sometimes even block them. However, the principle of defense in depth suggests that we should have controls in place that can help us detect an intrusion even when those other systems fail. File integrity monitoring is a great example of this type of control. File integrity monitoring systems watch the file system of an endpoint or server for any unexpected changes and then report those changes to an administrator for further investigation. They perform this function by using cryptographic hash functions. Hash functions take an…

内容