Protecting Endpoints

Computer network defense strategies for endpoint protection require assessment of the threats that the endpoint systems and devices will face. Once defenders have assessed the likely threats and which methods would be effective against them, they can balance the costs of the defenses and their ability to implement them against the need of their organization to provide that level of defense.

Typical defense-in-depth strategies for endpoints include a number of common layers:

  • Physical security

  • Policy and procedures

  • Configuration standards

  • Central management

  • Awareness and information sharing

  • Anti-malware and antivirus software

  • Configuration management, patching, and updates

  • Allow listing and deny listing (sometimes called ...

Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.