O'Reilly logo

Endpoint Security by Mark S. Kadrich - CISSP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1. Defining Endpoints

As with any process, to understand it, you first must define the elements that comprise the process. Consider, for example, the temperature-control system in your house or office. The system is composed of the building, doors, windows, insulation, heater, cooler, thermostat, fans, and ducting (see Figure 1-1). The thermostat is used as the control point; the building, doors, and windows define the perimeter. The thermostat controls the heater, cooler, ducting, and fans, and, you hope, the building (assuming that the windows and doors are closed) stays at a constant temperature.

Figure 1-1. A basic heating, ventilation, and air-conditioning (HVAC) system takes air in, heats it, cools it, and then pumps it back into the room. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required