Protecting Endpoints
Computer network defense strategies for endpoint protection require assessment of the threats that the endpoint systems and devices will face. Once defenders have assessed the likely threats and which methods would be effective against them, they can balance the costs of the defenses and their ability to implement them against the need of their organization to provide that level of defense.
Typical defense-in-depth strategies for endpoints include a number of common layers:
Physical security
Policy and procedures
Configuration standards
Central management
Awareness and information sharing
Anti-malware and antivirus software
Configuration management, patching, and updates
Allow listing and deny listing (sometimes called ...
Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.