Security Controls for Host Devices

This chapter presents the following topics:

•   Trusted operating system

•   Endpoint security software

•   Host hardening

•   Boot loader protections

•   Vulnerabilities associated with hardware

•   Terminal Services/application delivery services

It’s not inline network encryptors, proxy servers, and load balancers that users directly interface with each day but rather the host devices such as desktops and laptops. Given the users’ laser focus on these device types, hackers will be equally focused on attacking them. Naturally, we must match the attacker’s effort with a myriad of security controls that specifically secure host devices.

In this chapter, we take a look at trusted operating systems ...

Get CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003) now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.