CHAPTER 8
HOST PROTECTION SYSTEMS
Your enterprise hosts are your first and last line of defense. Attackers target all of these hosts—whether workstations, servers, or network devices—in order to inject any number of malware into your network. Your focus is on defending these hosts from numerous types of malware attacks and subversion wherever and whenever they occur. So far we’ve covered malware techniques, various functionalities, and even provided some working examples of malware and rootkits—all of which are targeting your hosts. We’ve discussed antivirus programs and the capabilities and limitations of those systems. Now let’s look at some other host-based security products that are designed to protect you.
Personal Firewall Capabilities ...
Get Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.