From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

IoC notifications

IoC notifications

- In this lesson, we're going to discuss indicators of compromise notifications that can occur in your enterprise network. Now, these notifications can occur in your file integrity monitoring applications, your security information and event management system, your data loss prevention platform, your intrusion detection system or intrusion prevention system, or your antivirus program. First, we have file integrity monitoring. File integrity monitoring or FIM is a host-based intrusion detection system that creates a hash digest for every file being monitored on a given system. If the file is changed or altered, the calculated hash digest for that file will no longer match the one recorded by the system and an alert or notification will be created. File integrity monitoring can be used on operating system and application files to detect malicious changes to those binaries by a piece of malware. Be aware, though, that when you update a program or install a security patch, this also will…

Contents