Watch this video on YouTube
What is the MOST efficient method for recognizing alterations in an information security environment?