File Integrity
Advertisement
Techopedia Explains File Integrity
Tech companies have built various file integrity monitoring tools to help system administrators determine whether a file’s integrity is intact. IT pros who perform file integrity monitoring sometimes use the "checksum" method to compare two versions of a data set.In addition, many file integrity monitoring tools use "hashing," a method of creating and comparing cryptographic keys to determine whether a file has been altered or whether it has integrity. Some of these tools feature new automated "agent-less" monitoring, which was developed to cut costs; these tools perform a more thorough job of integrity monitoring and require less work in terms of deployment and implementation.
Related Question
How can you securely delete files?Advertisement
Related Terms
Related Reading
- PowerLocker: How Hackers Can Hold Your Files for Ransom
- Security: Top Twitter Influencers to Follow
- Can Public Key Infrastructure Provide More Security Online?
- The 7 Basic Principles of IT Security
- Single-Tenant vs. Multi-Tenant Applications: How to Choose
- Multimodal Learning: A New Frontier in Artificial Intelligence