From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Conduct file integrity checking
From the course: Performing a Technical Security Audit and Assessment
Conduct file integrity checking
- [Instructor] Certain files should change only under authorized circumstances. For instance, sensitive medical records must only be altered by authorized healthcare professionals when updating patient information. However, some file changes can happen for malicious reasons, such as deliberate data manipulation or destruction, or as a result of malware infections. Also, accidental alterations can occur due to human error or data corruption. In any of these situations, organizations need to detect unauthorized changes in critical files, and that's where file integrity checks play a vital role. The most effective method for verifying file integrity involves using software capable of hashing files. Hashing is a process that converts data such as a file or a piece of text into a fixed length string of characters. This generates a unique digital fingerprint of a file in its contents. If any alteration occurs, even a single character change, the hash of the modified file will be completely…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Baseline skill sets for security reviews2m 21s
-
(Locked)
Conduct documentation reviews1m 58s
-
(Locked)
Conduct log reviews2m 8s
-
(Locked)
Conduct ruleset reviews2m 18s
-
(Locked)
Conduct system configuration reviews2m 51s
-
(Locked)
Conduct network sniffing1m 19s
-
(Locked)
Network sniffing tool demo: Wireshark2m 16s
-
(Locked)
Conduct file integrity checking2m 39s
-
File integrity checking tool demo1m 21s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews2m 37s
-
-
-
-
-
-
-