slide1
Download
Skip this Video
Download Presentation
File Integrity Monitoring- A Component in PCI Compliance Software

Loading in 2 Seconds...

play fullscreen
1 / 8

File Integrity Monitoring- A Component in PCI Compliance Software - PowerPoint PPT Presentation


  • 93 Views
  • Uploaded on

The File Integrity Monitoring is highly functional at detecting any alterations and unauthorized access to system files. It curtails the risk of breaches being conducted by insiders or expert users and it keeps the system stable by deterring the changes in system configuration by unauthorized and unplanned moves.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'File Integrity Monitoring- A Component in PCI Compliance Software' - promisec


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

File Integrity Monitoring

A Critical Component in

PCI Compliance Software

PROMISEC

www.promisec.com

slide2

The capability of any security information program is measured by its ability to quickly detect and fix data breaches. 

Lets us discuss the File integrity monitoring (FIM), an important part of payment card Industry’s data Security standard compliance-

www.promisec.com

PROMISEC

slide3

Understanding the threats

The threats in the cyber world can be broadly categorized into outside and inside threats. The Inside threats can be malicious or non-malicious. The latter includes an involuntary exposure of the data resulting from poor judgment and mistakes. The malicious threats include the intended exposure carried out to avail the financial gains. These can result in the serious damage and must be dealt with precautionary measures.

PROMISEC

www.promisec.com

slide4

Attacks by the hackers

In the recent past, most cyber attacks of drastic nature are carried out by the hackers systematically and potently. The breach at Heartland Payment Systems, the Stuxnet Worm breach and the breach of Iran’s nuclear centrifuges are a few examples of such drastic breaches that resulted in the loss of millions.

PROMISEC

www.promisec.com

slide5

Functions of File Integrity Monitoring

The FIM is highly functional at detecting any alterations and unauthorized access to system files. It performs the following functions-

It curtails the risk of breaches being conducted by insiders or expert users.

It keeps the system stable by deterring the changes in system configuration by unauthorized and unplanned moves.

It helps to enhance the performance of the system by checking the changes implemented outside the managed environment

It helps to prevent Compliance Failure by carefully accessing the sensitive data and demonstrating due care.

PROMISEC

www.promisec.com

slide6

Role of File Integrity Monitoring in PCI Compliance Software

The Role of FIM is not only limited to preventing data breaches. It is also an imperative part of the PCI Compliance Software. The payment card companies such as MasterCard, Visa, American Express and Discover deal with the sensitive information pertaining to their customers. The businesses who manage the data security standard for these companies mentions FIM in their PCI DSS requirements. These requirements are basically a set of controls developed by the Payment card industry, which all businesses need to implement.

www.promisec.com

PROMISEC

slide7

Use of File Integrity Monitoring in Cyber Security:

Role of FIM is to allow system administrators, managers and security professionals to look into the files and directories that change over the time. It basically validates the integrity of files of application software’s and operating system with the help of a verification technique.

PROMISEC

www.promisec.com

slide8

CONTACT US

[email protected]

www.promisec.com

@Promisec_IT

ad