LOCATION BASED FILE INTEGRITY MONITORING & PREVENTING

  • Unique Paper ID: 170669
  • Volume: 11
  • Issue: 7
  • PageNo: 1564-1570
  • Abstract:
  • File Integrity Monitoring (FIM) is a critical security mechanism used to detect unauthorized modifications, deletions, or additions to files. Traditional FIM systems focus on monitoring file changes but lack spatial awareness, which can be a vital context in identifying and mitigating potential security threats. The effectiveness of an integrity checker depends on factors such as the strength of the cryptographic algorithms used, the frequency of checks, and the robustness of the overall system architecture. Challenges in implementing integrity checkers include balancing performance with security and addressing evolving threats. Integrity checkers play a vital role in safeguarding data integrity across various domains. Their continued development and integration into systems are essential for ensuring reliable and secure information management in an increasingly complex digital landscape.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{170669,
        author = {G ASHAJYOTHI and K JYOTHI and CHOPPADANDI KEERTHI and P SHANMUKHA KUMAR},
        title = {LOCATION BASED FILE INTEGRITY MONITORING & PREVENTING},
        journal = {International Journal of Innovative Research in Technology},
        year = {2024},
        volume = {11},
        number = {7},
        pages = {1564-1570},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=170669},
        abstract = {File Integrity Monitoring (FIM) is a critical security mechanism used to detect unauthorized modifications, deletions, or additions to files. Traditional FIM systems focus on monitoring file changes but lack spatial awareness, which can be a vital context in identifying and mitigating potential security threats. The effectiveness of an integrity checker depends on factors such as the strength of the cryptographic algorithms used, the frequency of checks, and the robustness of the overall system architecture. Challenges in implementing integrity checkers include balancing performance with security and addressing evolving threats. Integrity checkers play a vital role in safeguarding data integrity across various domains. Their continued development and integration into systems are essential for ensuring reliable and secure information management in an increasingly complex digital landscape.},
        keywords = {Unauthorized changes, Data integrity, File modification.},
        month = {December},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 11
  • Issue: 7
  • PageNo: 1564-1570

LOCATION BASED FILE INTEGRITY MONITORING & PREVENTING

Related Articles