This chapter presents the following topics:
• Trusted operating system
• Endpoint security software
• Host hardening
• Boot loader protections
• Vulnerabilities associated with hardware
• Terminal Services/application delivery services
It’s not inline network encryptors, proxy servers, and load balancers that users directly interface with each day but rather the host devices such as desktops and laptops. Given the users’ laser focus on these device types, hackers will be equally focused on attacking them. Naturally, we must match the attacker’s effort with a myriad of security controls that specifically secure host devices.
In this chapter, we take a look at trusted operating systems ...