A security practice that verifies and monitors operating systems, application software files, and databases to detect fraud, changes in file configurations, and unauthorized access.