@inproceedings{b4a040f91d8c4f8cbbb8abc8ce3c17fd,
title = "Comparison of File Integrity Monitoring (FIM) techniques for small business networks",
abstract = " File Integrity Monitoring (FIM) can provide the ability to track changes which have been made to an operating system or software as a result of malicious behavior. For small business environments, the need for these tools is present; however, because of the difficulty of managing such software many businesses may ignore using them. This paper will discuss how a small business should create criteria for comparing file integrity monitoring tools in order to locate the most effective product for their environment.",
keywords = "auditing, log file integrity monitoring, log management, small business environments",
author = "Brittany Wilbert and Lei Chen",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 ; Conference date: 11-07-2014 Through 13-07-2014",
year = "2014",
month = nov,
day = "19",
doi = "10.1109/ICCCNT.2014.6963090",
language = "English",
series = "5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014",
address = "United States",
}