Watch this video on YouTube
Which security practice involves monitoring and detecting unauthorized changes to critical files or system components?