O'Reilly logo

Endpoint Security by Mark S. Kadrich - CISSP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

7. Threat Vectors

One can attack an endpoint in numerous ways, but for the most part the truly devastating methods leverage the power afforded by the operating system. If you “own” the operating system, you can do anything you want. If you’re the system administrator or the root user, you can turn off the firewall, kill the intrusion detection system (IDS), and clear out the logs. When attackers have that kind of access, they can cover their tracks and make it very difficult for you to find them.

Many operating systems are pretty loose with who they allow to run programs with administrative privileges, whereas others don’t allow any to run with executive status. Minimizing the list of applications, and users, that run with that level of privilege ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required