O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Advanced Malware Protection (AMP)

The threats in the modern cyber world are delivered through multiple channels and as files that might not look suspicious when they enter the network. However, the malware morphs into different forms and becomes active after some time, thus launching an attack.

AMP systems are systems that track any known files using hash values to alert security triggers and prevent the spread of the files and malware. These systems also track unknown files by using a technique called sandboxing where the file is kept in an isolated environment to check if the files morphs and is a security threat. If it does, it is important to block the files from then on, which is done using the hash value for the file. However, an important ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required