{"id":13799,"date":"2014-08-15T13:54:01","date_gmt":"2014-08-15T13:54:01","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/file-integrity-monitoring\/"},"modified":"2015-05-18T12:44:39","modified_gmt":"2015-05-18T12:44:39","slug":"file-integrity-monitoring","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/30565\/file-integrity-monitoring-fim","title":{"rendered":"File Integrity Monitoring"},"content":{"rendered":"
File integrity monitoring refers to a process for making sure that files have integrity; in other words, that they have not been damaged nor manipulated over a certain time period. File integrity monitoring tools are generally utilities for internal processes that check current file integrity against a predetermined baseline.<\/p>\n
In order to compare files for integrity, these tools typically use a ‘checksum.\u2019\n<\/p>\n
The checksum can also be called a hash sum, where ‘hashing\u2019 refers to a procedure that changes a text file or long text string into a consolidated, searchable value.\n<\/p>\n
In a way, file integrity monitoring can be like various security processes that use hashing. The checksum is a reduce data set that can show a tool or utility whether a file has been changed in some way. By using these reduced data sets, which can be thought of as ‘digital signatures,\u2019 various applications and monitoring systems can work on a more effective basis, without having to comb through the entire file to look for errors or manipulation.\n<\/p>\n
Today, some companies offer cloud-based file integrity monitoring and other kinds of file integrity monitoring services that utilize algorithms and proprietary technology. These may be included in a package for security and data backup, or in specific stand-alone processes for identifying file and system changes.<\/p>\n","protected":false},"excerpt":{"rendered":"
What Does File Integrity Monitoring Mean? File integrity monitoring refers to a process for making sure that files have integrity; in other words, that they have not been damaged nor manipulated over a certain time period. File integrity monitoring tools are generally utilities for internal processes that check current file integrity against a predetermined baseline. […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,227],"class_list":["post-13799","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-data-management"],"acf":[],"yoast_head":"\n